Preferred Language
Articles
/
oBfP4o8BVTCNdQwC5H-k
Synthesis of Some New Heterocyclic Fused Rings Compounds Based on 5-Aryl-1,3,4-Oxadiazole
...Show More Authors

The work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3) with carbon disulfide in presence of potassium hydroxide. Compound 6-(4-chlorophenyl)-[1,2,4] triazolo [3,4-b][1,3,4] oxadiazole-3-amine (5) was synthesized from treatment of compound (3) with cyanogen bromide at room temperature in the presence of sodium hydrogen carbonate. Direct reaction between acetic acid and compound (3) in POCl3 affords 6-(4-chlorophenyl)-3-methyl-[1,2,4] triazolo [3,4,b][1,3,4] oxadiazole (compound 6). Five new fused rings derivatives (12-16) [6-(4-chlorophenyl)-3-(aryl)-[1,2,4] triazolo[3,4-b][1,3,4]oxadiazol] were synthesized by two steps. The first step was synthesized by corresponding Schiff bases (7-11) from reaction compound (3) with five aryl aldehyde. These Schiff bases were used as substrate to synthesize compounds (12-16) by treating these compounds with bromine in glacial acetic acid in dry sodium acetate.The synthesized compounds were characterized by FTIR,H-NMR,C-NMR and CHNS analysis.

Publication Date
Sun Jan 01 2017
Journal Name
Al-qadisiyah Journal Of Pure Science
Synthesis and Spectroscopic Studies of Some Metal Complexes of [3-(3-(2-chloroacetyl)thioureido)pyrazine-2-carboxylic acid]
...Show More Authors

A new ligand [3(3(2chloroacetyl) thioureido)pyrazine-2-carboxyliIcacid](CPC)was synthesized by reaction of rized by imicro elmental analysis C.H.N.S.,FT-IR,UV-Vis and 1H-13CNMR spectra, some transition metals complex ofIthis ligand were Prepared and characterized byiFT-IR,UV-Vis spectra conductivity measurements magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were[M(CPC)2](M+2i=Mn. Co, Ni, Cu, Zn, Cd and Hg),the proposedi geometrical structure for all complexes were as tetrahedral geometry except copper complex has square planer geometry.

Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and characterization of novel metal complexes of (pentulose-?-lactone-2,3-enedibenzoate barbituric acid) with some metal ions
...Show More Authors

New (pentulose-?-lactone-2,3-enedibenzoate barbituric acid) (L) have been synthesized by reaction of (5-C-dimethyl malonyl-pentulose-?-lactone-2,3-enedibenzoate) with urea in alkaline media (sodium methoxide). (Ca+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2 and Hg+2) complexes of (pentulose-?-lactone-2,3-enedibenzoate barbituric acid) (L) have been prepared and characterized by (1H and 13CNMR), FTIR, (U.V-Vis) spectroscopy, Atomic absorption spectrophotometer (A.A.S), Molar conductivity measurements and Magnetic moment measurements, and the following general formula has been given for the prepared complexes [MLCl2(H2O)].XH2O, where M = (Ca+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2, Hg+2), X = five molecules with (Cd+2) complex, L = (pentulose-?-lactone-2,3

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Synthesis and characterization of mixed ligand complexes of 8- hydroxy quinoline and Schiff base with some metal ions
...Show More Authors

A new mixed ligand complexes have been prepared between 8- hydroxy quinoline and o-hydroxybenzylidene-1-phenyl-2,3-dimethyl-4-amino-3-pyrazolin-5-on with Mn(II),Fe(II),Co(II),Ni(II) and Cu(II) ions . the prepared complexes were isolated and characterized by (FT-IR)and (UV-Vis) spectroscopy. Elemental analysis (C.H.N) Flame atomic absorption technique . in addition to magnetic susceptibility and conductivity measurement.

View Publication Preview PDF
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication