In this research various of 2,5-disubstituted 1,3,4-oxadiazole (Schiff base, oxo-thiazolidine , and other compounds) were synthesized from 2,5-di(4,4?- amino-1,3,4-oxadiazole ) which use quently synthesized from mixture of 4-amino benzoic acid and hydrazine in the presence of polyphosphorus acid. The synthesized compounds were characterized by using some Spectral data (UV, FT-IR, and 1H-NMR).
The aim of the work is synthesis and characterization of bidentate ligand [3-(3-acetylphenylamino)-5,5-dimethylcyclohex-3-enone][HL], from the reaction of dimedone with 3-amino acetophenone to produce the ligand [HL], the reaction was carried out in dry benzene as a solvent under reflux. The prepared ligand [HL] was characterized by FT-IR, UV-Vis spectroscopy, 'H, 8C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [HL] was used as a primary ligand while 8-hydroxy quinoline [HQ] was used as a secondary ligand with metal ion M(IT).Where M(IT) = (Mn ,Co ,Ni ,Cu ,Zn ,Cd and Pd) at reflux ,using ethanol as a solvent, KOH as a
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreThe aim of the research was designing a nutritional program with amino acids well as designing exercises for muscular strength training for youth female badminton players. In addition to that the researcher aimed at identifying the effect of amino acid accompanied with muscular training on some physiological indicators in youth female badminton players. The researcher used the experimental method. The subjects were (7) youth female badminton players from the Armenian badminton club. Many physiological tests were conducted including PWC170 and Vo2Max. The data was collected and treated using proper statistical operations to conclude that amino acid accompanied with muscular ability training have a positive effect on some physiological indica
... Show MoreThe title compound, [Ru(C12H7Br2N2)2(CO)2], possesses a distorted octahedral environment about the Ru atom, with two cyclometallated 4,4′-dibromoazobenzene ligands and two mutually cis carbonyl ligands. The donor atoms are arranged such that the N atoms are mutually trans and the aryl C atoms are trans to carbonyl ligands.
In recent years, observed focus greatly on gold nanoparticles synthesis due to its unique properties and tremendous applicability. In most of these researches, the citrate reduction method has been adopted. The aim of this study was to prepare and optimize monodisperse ultrafine particles by addition of reducing agent to gold salt, as a result of seed mediated growth mechanism. In this research, gold nanoparticles suspension (G) was prepared by traditional standard Turkevich method and optimized by studying different variables such as reactants concentrations, preparation temperature and stirring rate on controlling size and uniformity of nanoparticles through preparing twenty formulas (G1-G20). Subsequently, the selected formula that pr
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
Despite the antiplaque effect of mouth-rinsing with a combination composed of miswak (Salvadora persica L.) and green tea (Camellia sinensis var. assamica) extracts, no data are available regarding its effect on gingival tissue at the molecular level. This pilot study aimed to assess the effect of oral rinsing with this combination on gingival crevicular fluid (GCF) flow and IL-1β levels. Ten subjects rinsed with either the combination, 0.12% chlorhexidine gluconate (CHX) or distilled water without toothbrushing for 4 days after receiving baseline polishing. GCF IL-1β concentration, influx, resting volume and plaque quantity were measured at baseline and after 4 days for each intervention. No significant differences in GCF flow or
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More