The tetradentate N2O2 Schiff base ligand, which is produced via the condensation reaction of 2-hydroxynaphthaldehyde with phthalohydrazide, is prepared in this work with a fair yield. The prepared ligand was characterized using a microanalysis technique (C.H.N), UV-vis, FTIR, 1H-,13C-NMR, mass spectrometry, and thermal gravimetric analysis (TGA). New complexes were synthesized by a reaction between ligand (N'1E,N'2Z)-N'1,N'2-bis((1-hydroxynaphthalen-2yl)methylene)phthalohydrazide and metal chloride of Co+2, Ni+2, and Zn+2 ions in absolute ethanol. The present complexes are also characterized by techniques such as C.H.N, UV-vis, FTIR, TGA, molar conductivity, atomic absorption, and magnetic moment measurements. The in vitro antimicro
... Show MoreIn this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the str
... Show MoreCoupling reaction of 2-amino benzoic acid with phenol gave the new bidentate azo ligand. The prepared ligand was identified by Microelemental Analysis, FT-IR and UV-Vis spectroscopic technique. Treatment of the prepared ligand with the following metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentr
... Show MoreIn search of novel antibacterial agent, a series of new isatin derivatives (3a-d) have been synthesized by condensation isatin (2,3-indolinendione) with piperidine (hexahydropyridine), hydrazine hydrate and Boc-amino acids respectively. Compounds synthesized have been characterized by IR spectroscopy and elemental analysis. In addition, the in vitro antibacterial properties have been tested against E. coli, P. aeruginosa, and Bacillus cereus, S. aureus by employing the well diffusion technique. A majority of the synthesized compounds were showing good antibacterial activity and from comparisons of the compounds, compound 3d has been determined to be the most active compound.
In this work pyrazolin derivatives were prepared from the diazonium chloride salt of 4-aminobenzoic acid. Azo compounds were prepared from the reaction of an ethanolic solution of sodium acetate and calculated amount of active methylene compound namely, acetyl acetone to obtain the corresponding hydrazono derivative (1). Cyclocondensation reaction of compounds (1) with hydrazine hydrate and phenyl hydrazine in boiling ethanol affording the corresponding pyrazoline-5-one derivatives of 4-aminobenzoic acid (2,3). Then compound (3) was reacted with thionyl chloride to give the corresponding acid chloride derivative(4), followed by conversion into the corresponding acid hydrazide derivative (5) carboxylic acid thiosemicarbazide (11), esters
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreChromene is considered a fused pyran ring with a benzene ring, which is found in many plants and is part of many important compounds such as anthocyanidins, anthocyanins, catechins, and flavanones. These compounds are included under the headings "flavonoids" and "isoflavonoids." These compounds are well known as bioactive molecules with wide medicinal uses. According to these pharmacokinetic characteristics, many researchers are giving more attention to this type of compound and its derivatives. Many chromene derivatives have been synthesized to study their biological effects for the treatment of many diseases. Furthermore, the researcher displayed wide interest in finding new methods for synthesizing chromene derivatives. These met
... Show MoreThis article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show More