Heterogeneous organic compounds play an important role in our daily life as they contribute in many medical and industrial fields and are in continuous development as a result of the preparation of new derivatives with different properties. From this premise, the goal of this work appears, which is preparation of (four, five, six, and seven) membered ring systems derived from furfural, by its reaction with different aromatic aldehydes, and record their antioxidant activity by using free radical scavenging method of DPPH radicals. The new ring systems are synthesized by reacting the prepared Schiff-bases with different ring closure agents (chloroacetyl chloride, mercaptoaceticacid, anthranilic acid, and phthalic anhydride), the prepared compounds were characterized by measuring their melting points and recording their infrared spectra in addition to the NMR spectra for some of them, the recorded results for some derivatives were higher when comparing them with ascorbic acid as a drug because these compounds have electrons that are able to terminate the free radicals that cause the oxidation process.
Experienced organizations in recent years, significant challenges , especially with the spread of economic globalization, making it required to provide new and better through experience , creativity and innovation to achieve the quality and high-quality products of all kinds , in order to achieve the objectives of the study and to answer its questions tested the study in the woolen Industries sector in Baghdad . The study was applied to a sample of 30 people in the senior management and the middle and lower in the company (managers of sections , and managers of people , and managers of the units , and office managers ) and for the processing of data and information used several statistical methods and extracted result
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreAs one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
Since the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show More