This research includes synthesis of new heterocyclic derivatives of N-benzyl-5-bromoisatin. New 1, 2, 4-triazole, oxazoline and thiazoline derivatives of [N-benzyl-5-bromo-3-(Ethyliminoacetate)-indole-2-one] (2) have been synthesized. The preparation process started by the reaction of 5-bromoisatin with sodium hydride in dimethylformamide (DMF) at 0°C, gave suspension of sodium salt of 5-bromoisatin and subsequent reaction with benzylchloride to give N-benzyl-5-bromoisatin (1). Compound (1) reacted with ethylglycinate (Schiff base) obtained the intermediate compound (2) which reacted with different reagents in two ways. The first way, compound (2) reacted with (hydrazine hydrate, semicarbazide, phenylsemicarbazide and thiosemicarbazide), then converted to (hydrazide, semicarbazide, phenylsemicarbazide and thiosemicarbazide) derivatives respectively to give compounds (3-6). After that compounds (4-6) cyclized in presence of alkaline media (4N-NaOH) to form substituted 1, 2, 4-triazole derivatives (7-9). In alkaline media (20%KOH) compound (3) reacted with CS2 to give potassium salt (10) that reacted with excess of hydrazine hydrate to give compound (11). The second way includes reaction of compound (3) with (phenylisocyanate and phenylisothiocyanate) to give compound (5 and 12), which undergo cyclization with p-bromophenacylbromide to obtain oxazoline (13) and thiazoline (14). Newly synthesized compounds were identified via spectral methods; their [FTIR and some of them by 1HNMR, 13C-NMR] and measurements of some of its physical properties and also some specific reactions. Furthermore the effects of the synthesized compounds were studied on some strains of bacteria.
Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap
... Show MoreThe Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute
... Show MoreThe study aimed to evaluate the antimicrobial activity using different concentrations of aqueous and alcoholic extracts of dried lemongrass leaves. Chemical phytochemical tests were performed for aqueous and alcoholic extracts of lemongrass. Antimicrobials activity was tested using agar disc diffusion method against Escherichia coli and Staphylococcus aureus. The results of the study showed that the aqueous extract of dried lemon leaves was highly effective (P≤0.05) against S. aureus, as the inhibition diameter was 22 mm for 50 dilution, while the inhibition diameter decreased to 15 mm for concentration 100. As for the alcoholic extract only, the diameter of inhibition decreased significantly (P≤0.0
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreInvestigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
Background: Displaced intracapsular fracture of the femoral neck remain a challenging issue despite the advancement in the ways of treatment .The purpose of this study is to assess the results of different methods of treatment in different age groups. Methods: This study was conducted over a period from (1998-2004) on 26 patients, with ages of 5 – 85 years with intracapsular fracture of the femoral neck due to different insults in Tikrit teaching hospital. Open reduction and internal fixation was done to those patients of<60 years of age, while uncemented Austin-Moore hemiarthroplasty was conducted in patients of >60 years old. Patients were followed for 6-12 months for any complication. Results: The main age group among the pati
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThree series of monomers, polymers and thioester cyclic compounds containing 4H-1,2,4-triazol-3-thiol moiety were synthesized and examined for their liquid crystalline properties. All monomers, polymers and thioester compounds were characterized by elemental analysis and FTIR, 1 H-NMR and mass spectroscopy. The phase transition and mesomorphic properties were investigated by polarized optical microscope (POM) and differential scanning calorimetry (DSC). The monomer with terminal phenyl substituent display dimorphism nematic and smectic A (SmA) mesophases. The corresponding polymers derived from acrylic and phenyl acrylic acid monomers show nematic mesophase. The only thioester cyclic compound derived from terephtaloyl chloride show nemati
... Show More