A new Schiff base, 2-N( 4- N,N – dimethyl benzyliden )5 – (p- methoxy phenyl) – 1,3,4- thiodiazol ,and their metal complexes Cu (Π) ,Ni (Π), Fe (III) , Pd (Π) , Pt (IV) , Zn(Π) ,V(IV) and Co (Π) , were synthesized. The prepared complexes were identified and their structural geometries were suggested by using flam atomic absorption technique , FT-IR and Uv-Vis spectroscopy, in addition to magnetic susceptibility and conductivity measurements. The study of the nature of the complexes formed in ethanol solution , following the mole ratio method , gave results which were compared successfully with those obtained from the isolated solid state studied. Structur
... Show MoreIn the current study, a direct method was used to create a new series of charge-transfer complexes of chemicals. In a good yield, new charge-transfer complexes were produced when different quinones reacted with acetonitrile as solvent in a 1:1 mole ratio with N-phenyl-3,4-selenadiazo benzophenone imine. By using analysis techniques like UV, IR, and 1H, 13C-NMR, every substance was recognized. The analysis's results matched the chemical structures proposed for the synthesized substances. Functional theory of density (DFT)
has been used to analyze the molecular structure of the produced Charge-Transfer Complexes, and the energy gap, HOMO surfaces, and LUMO surfaces have all been created throughout the geometry optimization process ut
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn search of novel antibacterial agent, a series of new isatin derivatives (3a-d) have been synthesized by condensation isatin (2,3-indolinendione) with piperidine (hexahydropyridine), hydrazine hydrate and Boc-amino acids respectively. Compounds synthesized have been characterized by IR spectroscopy and elemental analysis. In addition, the in vitro antibacterial properties have been tested against E. coli, P. aeruginosa, and Bacillus cereus, S. aureus by employing the well diffusion technique. A majority of the synthesized compounds were showing good antibacterial activity and from comparisons of the compounds, compound 3d has been determined to be the most active compound.
This article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show MoreIntroduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete
... Show MoreIn this work pyrazolin derivatives were prepared from the diazonium chloride salt of 4-aminobenzoic acid. Azo compounds were prepared from the reaction of an ethanolic solution of sodium acetate and calculated amount of active methylene compound namely, acetyl acetone to obtain the corresponding hydrazono derivative (1). Cyclocondensation reaction of compounds (1) with hydrazine hydrate and phenyl hydrazine in boiling ethanol affording the corresponding pyrazoline-5-one derivatives of 4-aminobenzoic acid (2,3). Then compound (3) was reacted with thionyl chloride to give the corresponding acid chloride derivative(4), followed by conversion into the corresponding acid hydrazide derivative (5) carboxylic acid thiosemicarbazide (11), esters
... Show MoreMan has a great role in the development of society in all fields, and therefore the human thought played a great role in its continuous pursuit and insight into the social classes that differ in their privileges, which makes the members of society not reconcile because of that disparity that is not based on human principles, so one class exploits another, and this is what stopped me Rather, it prompted me to choose the topic (class and its impact on society) in order to show the impact of classes on each other negatively and positively, so I work to avoid the first with the recommendations I put forward and offer guidance, and strengthen the second, and after this topic of necessity in a place because of the imbalance and promise of appr
... Show More