New Schiff bases derivatives [IV]a-e is prepared via condensation of Derythroascorbic acid with p-substituted aldehydes in dry benzene. To obtain these derivatives, the 5,6-O-isopropylidene-L-ascorbic acid[I] was chosen as starting material, compound prepared from the reaction of L-ascorbic acid as starting material. Compound[I] was prepared from the reaction of L-ascorbic acid with dry acetone in the presence of hydrogen chloride. The esterification of hydroxyl groups at C-2 and C-3 positions with excess ofethyl α –chloroacetate in the presence of sodium acetate produce acorresebonding ester [II] , which was condensed with hydrazine hydrate to give new hydrazide [III] . The new Schiff bases [IV]a-e were synthesized by reaction of acid hydrizide with different p-substituted benzaldehyde in dry benzene . The new 1,3- oxazepine derivatives [V]a-ewere obtained by Diels-Alder reaction of Schiff bases with phthalic anhydride in dry benzene (Scheme 1) . All the synthesized compounds have been characterized by melting points , FTIR and 1HMNR (of some of theme) spectroscopy. The biological activity of synthesized compounds was examined against two types of bacteria; G(+) and G(-).
The first aim of this paper was to evaluate the push-out bond strength of the gutta-percha coating of Thermafil and GuttaCore and compare it with that of gutta-percha used to coat an experimental hydroxyapatite/polyethylene (HA/PE) obturator. The second aim was to assess the thickness of gutta-percha around the carriers of GuttaCore and HA/PE obturators using microcomputed tomography (
In this study, a total of 209 individuals of leeches were collected from Al-Hindyia River / Babil Province. 116 individuals were identified as Erpobdella octaculata (Linnaeus, 1758), 50 individuals as Erpobdella punctata (Leidy,1870) and 43 individuals as Hemiclepsis marginata (Müller, 1774). Four samples were collected monthly during a period from February to June 2018. Some physical and chemical water properties were also examined, including air and water temperature, potential of hydrogen pH, Electrical Conductivity EC, Total Dissolved Solid TDS, Dissolved Oxygen DO, and the Biological Oxygen Demand BOD₅. Air and water temperature were r
... Show MoreThe present research aimed to study the polymorphisms of the chicken insulin-like growth factor 2 (IGF2) in two commercial broiler breeds (Cobb 500 and Hubbard F-15). In total, 300 avian blood samples were obtained. The genomic DNA was isolated using a fast salt-extraction technique. Moreover, polymerase chain reaction (PCR) was used to amplify 1146 bp fragments of the gene. The amplified fragments were subjected to restriction enzyme digestion using the HinfI endonuclease enzyme, and the digested products were separated on a 2% agarose gel. The findings indicated that there were two alleles, T and C, for the target locus, with frequencies of 73.3% and 26.7%, respectively. Three distinct genotype variations, TT, TC, and CC, were found, with
... Show MoreThere are many animal models for polycystic ovary (PCO); using exogenous testosterone enanthate is one of the methods of induction of these models. However, induction of insulin resistance should also be studied in the modeling technics. Therefore, the present study aims to investigate the expression of insulin receptor substrate (Irs)-2 mRNA in the liver tissue of rat PCO model. Nineteen Wistar rats were divided into three groups; (1) PCO modeling group (N =7) received daily 1.0 mg/100g testosterone enanthate solved in olive oil along with free access dextrose water 5%, (2) vehicle group (N =6), which handled like the PCO group, but did not receive testosterone enanthate, (3) control group (N =6) with standard care. Al
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreIn the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More