The synthesis of new benzodiazepine, imidazole, isatin, maleimide, pyrimidine and 1,2,4-triazole derived from 2-amino-4-hydroxy-1,3,5-triazine, via its cyclocondensation reaction with different organic reagents, is described. FT-IR, 1H-NMR and as well as 13C-NMR spectra disclosed the structures of the precursors and heterocyclic derivatives formed.
In this effort, we define a new class of fractional analytic functions containing functional parameters in the open unit disk. By employing this class, we introduce two types of fractional operators, differential and integral. The fractional differential operator is considered to be in the sense of Ruscheweyh differential operator, while the fractional integral operator is in the sense of Noor integral. The boundedness and compactness in a complex Banach space are discussed. Other studies are illustrated in the sequel.
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreA comparison study was made for the reaction of triruthenium carbonyl Ru3(CO)12 with azoarene ArN=NAr . This reaction was monitored in two kinds of solvents , toluene , and n- octane , which yielded new triruthenium carbonyl complex Ru3(μ3-NAr)2(CO)9 . The reactions of azoarenes ArN=NAr with Ru3(CO)12 formed the following trinuclear compound of Ru3((μ3- NAr)2(CO)9 (Ar-C6H4Br-4) in law yield . In addition , to new isomers species of mononuclear cyclometallated of Ru(BrC6H4N-NC6H4NBr-4)2(CO)2 in different percentages . The mechanism of the reaction domenstrates that the formation of trinuclear bis arylimido complexes , and ortho metallated was , the result of cleavage of nitrogen –nitrogen bond . Monitoring this gave evidence that the rea
... Show Moreالخلاصة لقد شكل المحافظون الجدد وهم بالأساس نخبة من المثقفين ومن السياسيين الأمريكيين كتلة ضغط كبيرة التأثير على الإدارة في عهد الجمهوريين. حمل هؤلاء المحافظون مشروعاً إيديولوجياً البسوه لسلطة الجمهوريين وهو يهدف إلى جعل أمريكا سيدة العالم من دون منازع خاصة بعد انهيار الاتحاد السوفييتي ونهاية الحرب الباردة. واكب هذا الحدث التاريخي الكثير من الأفكار ومنها (نهاية التاريخ)، وصراع الحضارات، وكذ
... Show MoreBased on collections made during March to September 2012. A totals of 58 species belong to 33 genera were identified from extra north to extra south of Erbil governorate, among them 30 species are registered as a new record to flora of Iraq. Most attention was paid to the most common and abundant lichens that present almost in most locations, which were Collema cristatum, Diploschistes scruposus, Lecanora dispersa, Lecanora murales, Pertusaria flavicunda, Placidium lacinulatum, Thelomma californicum and Verrucaria Maura.
This paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2