Background:
A new ligand [N-(3-acetylphenylcarbamothioyl)-4-chlorobenzamide] (CAD) was synthesized by reaction of 4-Chlorobenzoyl isothiocyanate with 3-amino acetophenone, The ligand was characterized by elemental micro analysis C.H.N. S., FT-IR, UV-Vis and 1H,13C- NMR spectra, some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(CAD)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral.
Two new nonsymmetrical mesogenic homologous series of terminal substituent ether (series [Vn]) and carboxy (series [VIn]) incorporating azobenzene and 1,3,4-oxadiazole group were synthesized. Both series have been All compounds thus isolated were purified and characterized by elemental analysis, Fourier Transform Infrared Spectroscopy, 1H NMR, along with thermal analysis and texture observation using Differential Scanning Calorimetry (DSC) and Polarizing Optical Microscopy (POM), respectively. All compounds of the first series exhibited liquid crystalline properties. The homologues [V1]-[V3] display a nematic mesophase, the compounds [V4]-[V7] exhibit a dimorphism behavior, nematic (N) and smectic A (SmA) mesophases, the compounds [V8] and
... Show MoreNew ligands, N1, N4-bis (benzo[d]thiazol-2- ylcarbamothioyl) succinamide (L1) and N1, N4- bis (benzylcarbamothioyl)succinamide (L2), derived from succinyl chloride and 2-amino benzothiazole or benzylamine, respectively, have been used to prepare a set of transition metal complexes with the general formula [M2(L)Cl4], where L=L1 or L2, M = Mn(II), Ni(II), Cu(II), Cd(II), Co(II), Zn(II) or Hg(II). The synthesized compounds were characterized using various analytical techniques including TGA, 13C NMR, mass spectroscopy, 1H and Fourier-transform infrared (FTIR) spectroscopy, magnetic measurement, molar conductivity, electronic spectrum, (%M, %C, %H, %N) and atomic absorption flame (AAF) analysis. The results showed that (L1, L2) bin
... Show MoreThe meteorite with a single total mass of 630 gm as a visible meteorite has fallen on 22 March 2021, at 10:00 a.m. in Al-Sherqat subdistrict within Salah Al-Din, northern Iraq; and therefore, was named Al-Sherqat meteorite by the authors. It is characterized by a uniform structure of coherent and medium degree of malleability. It is of a well-crystalline structure and not homogeneous in composition. The Al-Sherqat meteorite is composed of metallic phases of 7.6 gm/cm3 density exhibiting an oriented intergrowth of kamacite (α-FeNi) with taenite showing a Widmanstätten pattern on an etched polished section with the finest octahedrite kamacite bandwidth of less than 0.2 mm. It is composed of Fe (86.9 wt%), Ni (9.63 wt%), P (1.31 wt%)
... Show Moreβ-Adrenergic blocking agents, mostly comprising of β-amino alcohols, are of pharmaceutical significance and have received major attention due to their utility in the management of cardiovascular disorders including hypertension, angina pectoris, cardiac arrhythmias and other disorders related to the sympathetic nervous system. Most compounds available for clinical use belong to the aryloxypropanolamine series, which is considered the second generation of β-blocking agents. The present study includes the synthesis of compounds with an N-substituted oxypropanolamine moiety attached to the 1, 3, 4-thiadiazole derivatives. According to this information, eight compounds were synthesized and characterized by IR spectra and elemental m
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More