Till now, isatin derivatives have received a lot of interest in organic and medicinal chemistry due to their significant biological and pharmacological activities. Schiff’s and Mannich bases of isatins are an effective group of heterocyclic derivatives that play a significant role in medicinal chemistry as antimicrobial agents. In light of these facts, new Schiff bases and Mannich bases of isatin were synthesized. The monomer Mannich bases; 3(a-e) have been synthesized by reacting isatin with different secondary amines, piperidine, morpholine, and pyrrolidine, dimethylamine, diphenylamine, separately, and formaldehyde, while the dimer (5) formed by using piperazine and formaldehyde which then react separately with Phenylhydrazine to form new Schiff bases 4(a-e), and dimer Schiff base (6) as final products. The structures of the newly synthesized compounds were identified using two spectroscopic methods; (Fourier- transform infrared) FTIR and proton nuclear magnetic resonance spectroscopy (¹H-NMR) analysis. The preliminary in vitro antibacterial and antifungal screening results of new isatin derivatives [4(a-e) and 6] reported moderate to potent antimicrobial activity, the compound 4c exhibited moderate broad-spectrum antibacterial and antifungal activities compared to other derivatives. Moreover, compounds 4c and 6 have a good inhibitory effect against B. subtilis while amoxicillin (standard drug) shows no activity. For antifungal activity compounds (4a-c and 4e) have considerable activity towards C. albicans, whereas compound 4d exhibits slight activity and 6 of no activity.
Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreIn this paper, a new seven-parameter Mittag-Leffler function of a single com-plex variable is proposed as a generalization of the standard Mittag-Leffler function, certain generalizations of Mittag-Leffler function, hypergeometric function and confluent hypergeometric function. Certain essential analytic properties are mainly discussed, such as radius of convergence, order, type, differentiation, Mellin-Barnes integral representation and Euler transform in the complex plane. Its relation to Fox-Wright function and H-function is also developed.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreContracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS-1 (rD
... Show MoreContracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS
... Show MoreStick-slip is kind of vibration which associated with drilling operation in around the bottom hole assembly (BHA) due to the small clearance between drill string & the open hole and due to the eccentric rotating of string. This research presents results of specific experimental study that was run by using two types of drilling mud (Fresh water Bentonite & Polymer), with/without Nanoparticle size materials of MgO in various ratios and computes the rheological properties of mud for each concentration [Yield point, plastic viscosity, Av, PH, filter loss (30 min), filter cake, Mud Cake Friction, Friction Factor]. These results then were used to find a clear effects of Nanoparticle drilling mud rheology on stick - slip strength by sev
... Show MoreHas been studied both processes Almetzaz and extortion of a substance Alklanda Maysan different amounts of Alcaúlan Guy 70% alcohol solution using the method when the wavelength