A new derivatives of Schiff bases connected with 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c were prepared via many reactions starting by treating 1,4-phenylene diamine 1 with chloroacetylchloride to prepared compound 2, then reaction with p-hydroxybenzaldehyde to synthesize compound 3 then, this was reacted with thioglycolic acid and thiosemicarazide to giveN,N-(1.4-phenylene)bis(2-(4-(2-amino-5Hthiazolo[4,3-b][1,3,4]thiadiazol-5-yl)phenoxy)acetamide) 4. Compound 4 was treated with different aromatic aldehydes to give a new derivatives of Schiff bases containing 5H-thiazolo[3,4-b][1,3,4]thiadiazole ring 5a-c. The synthesized compounds were characterized using FTIR spectrophotometer and 1H NMR spectroscopy and the biological activity of
... Show MoreThe New Schiff base ligand 4,4'-[(1,1'-Biphenyl)-4,4'-diyl,bis-(azo)-bis-[2-Salicylidene thiosemicarbazide](HL)(BASTSC)and its complexes with Co(II), Ni(II), and Cu(II) were prepared and characterized by elemental analysis, electronic, FTIR, magnetic susceptibility measurements. The analytical and spectral data showed, the stiochiometry of the complexes to be 1:1 (metal: ligand). FTIR spectral data showed that the ligand behaves as dibasic hexadentate molecule with (N, S, O) donor sequence towards metal ions. The octahedral geometry for Co(II), Ni(II), and Cu(II) complexes and non electrolyte behavior was suggested according to the analysis data.
A new ligand (H4L) and its complexes with (CoII, NiII, CuII and PdII). This ligand was prepared in two steps, in the first step a solution of terephthaldehyde in methanol reacted under refluxe with 1,2-phenylenediamine to give precursore compound which reacted in the second step with 2,4- dihydroxybenzaldehyde to give the ligand. The complexes were synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods [FT-IR, UV-vis, 1HNMR, HPLC and atomic absorption], chloride contant in addition to conductivity measurement. The stability constant K and Gibbs free energy ∆G were calculated for [[Ni2(H2L)Cl2], [Cu2(H2L)Cl2] complexes using spectrophoto
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreDetection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show More