The work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3) with carbon disulfide in presence of potassium hydroxide. Compound 6-(4-chlorophenyl)-[1,2,4] triazolo [3,4-b][1,3,4] oxadiazole-3-amine (5) was synthesized from treatment of compound (3) with cyanogen bromide at room temperature in the presence of sodium hydrogen carbonate. Direct reaction between acetic acid and compound (3) in POCl3 affords 6-(4-chlorophenyl)-3-methyl-[1,2,4] triazolo [3,4,b][1,3,4] oxadiazole (compound 6). Five new fused rings derivatives (12-16) [6-(4-chlorophenyl)-3-(aryl)-[1,2,4] triazolo[3,4-b][1,3,4]oxadiazol] were synthesized by two steps. The first step was synthesized by corresponding Schiff bases (7-11) from reaction compound (3) with five aryl aldehyde. These Schiff bases were used as substrate to synthesize compounds (12-16) by treating these compounds with bromine in glacial acetic acid in dry sodium acetate.The synthesized compounds were characterized by FTIR,H-NMR,C-NMR and CHNS analysis.
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreIn this paper reliable computational methods (RCMs) based on the monomial stan-dard polynomials have been executed to solve the problem of Jeffery-Hamel flow (JHF). In addition, convenient base functions, namely Bernoulli, Euler and Laguerre polynomials, have been used to enhance the reliability of the computational methods. Using such functions turns the problem into a set of solvable nonlinear algebraic system that MathematicaⓇ12 can solve. The JHF problem has been solved with the help of Improved Reliable Computational Methods (I-RCMs), and a review of the methods has been given. Also, published facts are used to make comparisons. As further evidence of the accuracy and dependability of the proposed methods, the maximum error remainder
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreCorrect grading of apple slices can help ensure quality and improve the marketability of the final product, which can impact the overall development of the apple slice industry post-harvest. The study intends to employ the convolutional neural network (CNN) architectures of ResNet-18 and DenseNet-201 and classical machine learning (ML) classifiers such as Wide Neural Networks (WNN), Naïve Bayes (NB), and two kernels of support vector machines (SVM) to classify apple slices into different hardness classes based on their RGB values. Our research data showed that the DenseNet-201 features classified by the SVM-Cubic kernel had the highest accuracy and lowest standard deviation (SD) among all the methods we tested, at 89.51 % 1.66 %. This
... Show MoreOptimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received s
... Show MoreHeart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreThis work involves theoretical and experimental studies for seven compounds to calculate the electrons spectrum and NLO properties. The theoretical study is done by employing the Time Depending Density Functional Theory TD-DFT and B3LYP/high basis set 6-311++G (2d,2p), using Gaussian program 09. Experimental study by UV/VIS spectrophotometer device to prove the theoretical study. Theoretical and experimental results were applicable in spectrum and energy gap values, in addition to convergence theoretically the energy gap results from ΔEHOMO-LUMO and UV/VIS. spectrum. Consider the theoretical method very appropriate to compounds that absorb in vacuum UV.
يشهد العالم تقدما في كافة مجالات الحياة المختلفة وتزداد الحياة صعوبة يوما بعد يوم, ويزداد البحث في كافة المجالات التي تعمل على خدمة الإنسان ولقد طال هذا التقدم النشاط الرياضي ,فقد يكون لتطور التدريب الرياضي وتنوع أساليبه الدور الكبير في تحقيق اللياقة البدنية التي تعد إحدى أهم الأهداف التي يرمي إليها الدرس في كلية التربية الرياضية . واللياقة البدنية تستمد أهميتها من كونها إحدى مكونات اللياقة الشاملة التي بدو
... Show More