The work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3) with carbon disulfide in presence of potassium hydroxide. Compound 6-(4-chlorophenyl)-[1,2,4] triazolo [3,4-b][1,3,4] oxadiazole-3-amine (5) was synthesized from treatment of compound (3) with cyanogen bromide at room temperature in the presence of sodium hydrogen carbonate. Direct reaction between acetic acid and compound (3) in POCl3 affords 6-(4-chlorophenyl)-3-methyl-[1,2,4] triazolo [3,4,b][1,3,4] oxadiazole (compound 6). Five new fused rings derivatives (12-16) [6-(4-chlorophenyl)-3-(aryl)-[1,2,4] triazolo[3,4-b][1,3,4]oxadiazol] were synthesized by two steps. The first step was synthesized by corresponding Schiff bases (7-11) from reaction compound (3) with five aryl aldehyde. These Schiff bases were used as substrate to synthesize compounds (12-16) by treating these compounds with bromine in glacial acetic acid in dry sodium acetate.The synthesized compounds were characterized by FTIR,H-NMR,C-NMR and CHNS analysis.
The study involved preparing a new compound by combining between 2- hydroxybenzaldehyde and (Z)-3-hydrazineylideneindolin-2-one resulting in Schiff bases and metal ions: Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) forming stable minerals-based-Schiff complexes. The formation of resulting Schiff bases is detected spectrally using LC-Mss which gave corresponding results with theoretical results, 1H-NMR proves the founding of N=CH signal, FT-IR indicates the occurrence of imine band and UV-VIs mean is proved the ligand formation. On the other hand, minerals-based-Schiff was characterized using the same spectral means that relied with ligand (Schiff bases). Those means gave satisfactory results and proved the suggested distinguishable geometries
... Show MoreThe study involved preparing a new compound by combining between 2-hydroxybenzaldehyde and (Z)-3-hydrazineylideneindolin-2-one resulting in Schiff bases and metal ions: Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) forming stable minerals-based-Schiff complexes. The formation of resulting Schiff bases is detected spectrally using LC-Mss which gave corresponding results with theoretical results, 1H-NMR proves the founding of N=CH signal, FT-IR indicates the occurrence of imine band and UV-VIs mean is proved the ligand formation. On the other hand, minerals-based-Schiff was characterized using the same spectral means that relied with ligand (Schiff bases). Those means gave satisfactory results and proved the suggested distinguishable geometries.
... Show MoreAromatic Schiff-bases are known to have antibacterial activity, but most of these compounds are sparingly soluble in water. The present work describes the synthesis of new Schiff-bases derived from branched aminosugars. Treatment of 3-Amino-3-Cyano-3-Deoxy-1,2:5,6-Di-O-Isopropylene-α-D-Allofuranose (1) with the aldehydes (2) under reflux in methanol afforded the Schiff-bases (3) in good yields. The new Schiff-bases were in accord with their NMR, IR spectral data and elemental analysis.
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreRecently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show More