In the present study a series of some four-,five-and seven-membered heterocyclic compounds have been synthesized by the reaetion of Schiff bases (1a,b) with chloroacetyl chloride, sodium azide, thioglycolic acid or various anhydrides to give azetidinone (2a,b), tetrazole (3a,b), thiazolidinone (4a,b) and 1,3-oxazepine derivatives (5-8a,b) respectively. Schiff bases (1a,b)were prepared from the reaction of p-toluidine with aromatic aldehydes. All synthesized compounds were characterized by physical properties and spectral data.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreThe United States government allowed Native Americans to abandon their reservations in the 1950s and 1960s. The historical, social, and cultural backgrounds shaped the forms and themes of works by American Indian writers who urged people to refuse their culture's sense of shame. Moreover, their behavior corresponded with the restoration of individuals to their rituals after disappointment, loss of sense of life, and mental illness performed from the influence of mainstream American society. Among these writers, N. Scott Momaday and Leslie Marmon Silko participate in similar interest in portraying characters caught between indigenous beliefs and white mainstream standards.
The construction of
... Show MoreA new ligand complexes have been synthesis from reaction of metal ions of MnII , CoII , NiII , CuII , ZnII , CdII and PdII with schiff base [(E)-1-((2-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin-4-ylimino) methyl) naphthalen-2-ol [HL)]. The prepared [HL] was characterized by FT-IR, UV-Vis spectroscopy, 1H13CNMR spectra Mass spectra and melting point. The compounds were characterized by techniques UV-Vis and FT-IR spectral studies, micro analysis (C.H.N), determination of atomic absorption, chloride content, molar conductivity measurements, magnetic susceptibility and melting point. The ligand acts as a monobasic tridentate, coordinating through deprotonated phenolic O and azomethine N atoms. The compounds are neutral electrolytic in dimeth
... Show More