The characterization and design of this study of new liquid crystals with a V shape compounds containing thiazolidine-2,4-dione and 1,3-phenylene as a core unite with mesophase properties were reported. Preparation and characterization of chloroacetic acid, water, and thiourea to produce thiazolidine-2,4-dione [I] in the presence of strong hydrochloric acid. The 4-hydreoxybenzaldehyde and n-alkyl bromide were reacted with potassium hydroxide to create the n-alkoxy benzaldehyde., then the compound [I] reacted with [II]n in presence of piperidine to produce compounds [III]n. Also, converted resorcinol to a corresponding compound [IV] by refluxing pyridine and DMF with two moles of chloracetyl chloride, after that interacted the compounds [III]n and compound [IV] with sodium acetate to form compounds [V]n. FT-IR and 1HNMR spectroscopy were really used to determine the structures of the produced substances. Using polarized optical microscopy, these mesogens' mesomorphic characteristics were studied (POM).The synthesized molecules exhibited enantiotropic liquid crystal phases, the substances [V]1-4 exhibited an only the enantiotropic nematic phase.
This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreTI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThis study include design and synthesis of 2 derivatives of compounds consisting of mefenamic acid, glycine and organic nitrates (2-nitrooxy ethanol or 1,3-dinitrooxy-2-propanol). Nitric oxide NO has been reported to support many of the same mucosal protection mechanisms as prostaglandins and is sufficient for acute gastroprotection and ulcer healing. So we suppose these 2 compounds would reduce non-steroidal anti-inflammatory drugs NSAIDs gastrointestinal side effect.
Key words: Non-Steroidal anti-inflammatory dr
... Show MoreThe water supply network inside the building is of high importance due to direct contact with the user that must be optimally designed to meet the water needs of users. This work aims to review previous research and scientific theories that deal with the design of water networks inside buildings, from calculating the amount of consumption and the optimal distribution of the network, as well as ways to rationalize the use of water by the consumer. The process of pumping domestic water starts from water treatment plants to be fed to the public distribution networks, then reaching a distribution network inside the building till it is provided to the user. The design of the water supply network inside the building is
... Show MoreThe paper studies the science of “Biomimicry” or imitation of nature, and how to utilize it to create contemporary designs. It starts by defining biomimicry and innovation. Then, the style of imitating nature is highlighted, which is considered one of the most important methods of innovation. It includes simulating animals and plants (in their environmental conditions) to use the natural and dynamic design solutions to produce innovative designs, that enhance the concept of sustainability. Various forms of natural species are presented, to show their benefit in contemporary metal product designs. Finally, a model of a metal lighting unit is developed, where innovative ideas inspired by silkworm cocoon are used in its design. The stud
... Show MoreSewer network is one of the important utilities in modern cities which discharge the sewage from all facilities. The increase of population numbers consequently leads to the increase in water consumption; hence waste water generation. Sewer networks work is very expensive and need to be designed accurately. Thus construction effective sewer network system with minimum cost is very necessary to handle waste water generation.
In this study trunk mains networks design was applied which connect the pump stations together by underground pipes for too long distances. They usually have large diameters with varying depths which consequently need excavations and gathering from pump stations and transport the sewage
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreDiverting river flow during construction of a main dam involves the construction of cofferdams, and tunnels, channels or other temporary passages. Diversion channels are commonly used in wide valleys where the high flow makes tunnels or culverts uneconomic. The diversion works must form part of the overall project design since it will have a major impact on its cost, as well as on the design, construction program and overall cost of the permanent works. Construction costs contain of excavation, lining of the channel, and construction of upstream and downstream cofferdams. The optimization model was applied to obtain optimalchannel cross section, height of upstream cofferdam, and height of downstream cofferdamwith minimum construction cost
... Show More