We described herein the synthesized and characterized of new bent and liner core compounds containing thiazolidin-4-one ring[XI-XIII] and [XIV-XVI] respectively. These compounds synthesized by sequence reactions starting from reaction resorcinol or hydroquinone with chloracetyl chloride to yield compounds [I] and [II] ,then the later compounds reactant with 4-hydroxybenzylaldehyde to product dialdehyde compounds [III] and [IV] .The Schiff bases compounds[V-VII] and [VIII-X] synthesized from reaction the compound [III] or [IV] with different aromatic amines, while the bent and liner core mesogens containing thiazolidin-4-one ring [XI-XIII] and [XIV-XVI] synthesized from reaction Schiff bases compounds[V-VII] or [VIII-X] with thioglycolic acid. In addition estrfecation of cinnamic acid with methanol to yield ester compound[XVII]which was converted to their acid hydrazid[XVIII] and the acid hydrazid reacted with glysine in phosphorous oxychloride to yield (5-styryl-1,3,4-oxadiazol-2-yl) methanamine [XIX]. Then reactant the1,3,4-oxadiazol compound[XIX] with dialdehyde compound [III] or [IV] to product new Schiff bases compounds [XX] and [XXI] , afterword added thioglycolic acid to give new thiazolidin-4-one derivatives [XXII] and [XXIII], respectively. The synthesized compounds were characterized by melting points , FTIR ,1HNMR and mass spectroscopy (of some of them).The liquid crystalline properties were studied by hot stage polarized optical microscopy (POM) and differential scanning calorimetry(DSC).All the Schiff bases compounds [V-X] showed liquid crystals phases while thiazolidin-4-one derivatives[XI-XIII],[XIV-XVI]and [XXIII] didn’t show any liquid crystals properties except the compound [XXII] showed enantiotropic nematic phase.
In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreAbstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreBackground: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.
Type of the study: cross –sectional study.
Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of
... Show MoreIn this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.