A new ligand containing a dioxime derivatives,(H2L)(1) Namely P-phenylenediamine–N, N'-bis (2-butylidine-3-one oxime) has been prepared by condensation reaction of 2, 3-butanedion mono oxime (2) with 1, 4–diaminobenzene. The titled ligand (H2L) was used to prepare some metal ions complexes namely Co (II), Ni (II) and Cu (II). This ligand and its complexes were confirmed by FT-ir,(UV-Vis.), mass spectroscopy,( 1 H, 13 CNMR) and elemental micro analysis (CHN), molar conductance, element content and melting point measurement. It was concluded that the geometry around Cu (II) and Co (II) complexes were distorted tetrahedral geometry while Ni (II) complex was a square planer.
Abstract
The target derivative are gentamicin linked with L-Val- L-Ala by an ester linkage. These were synthesized by esterification method, which included the reaction of -OH hydroxyl group on (carbon No.5) of gentamicin with the acid chloride of the corresponding dipeptide, The preparation of new derivative of gentamicin involved protected the primary & secondary amine groups of Gentamicin, by Ethylchloroformate (ECF) to give N-carbomethoxy Gentamicin which was used for further chemical synthesis involving the free hydroxyl groups.
Then prepared dipeptide (L-Val- L-Ala) by conventional solution method in present DCC & HoBt then reacted with thionyl
... Show MoreThis research includes the synthesis of some new N-Aroyl-N \ -Aryl thiourea derivatives namely: N-benzoyl-N \ -(p-aminophenyl) thiourea (STU1), N-benzoyl-N \ -(thiazole) thiourea (STU2), N-acetyl-N ` -(dibenzyl) thiourea (STU3). The series substituted thiourea derivatives were prepared from reaction of acids with thionyl chloride then treating the resulted with potassium thiocyanate to affored the corresponding N-Aroyl isothiocyanates which direct reaction with primary and secondary aryl amines, The purity of the synthesized compounds were checked by measuring the melting point and Thin Layer Chromatography (TLC) and their structure, were identified by spectral methods [FTIR,1H-NMR and 13C-NMR].These compounds were investigated as a
... Show MoreThe effect of compound machine on wheat/ AlNoor cultivar was studied based on some technical indicators. were tested under three speeds ( 2.541, 3.433 and 4.091km.hr-1) and three tillage depths (14, 16 and 18cm). The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the 2.541km.hr-1 practical speed was significantly better than other two speed in all studied conditions. Except for the FC, which achieved the best results with the third speed 4.091 km.hr-1. mechanical parameters, plant growth parameters and yield and growth parameters. The 1
This article aims to explore the importance of estimating the a semiparametric regression function ,where we suggest a new estimator beside the other combined estimators and then we make a comparison among them by using simulation technique . Through the simulation results we find that the suggest estimator is the best with the first and second models ,wherealse for the third model we find Burman and Chaudhuri (B&C) is best.
Background: The elimination of the microorganisms from the root canal systems, an important step for the successful root canal treatment. This study was conducted to evaluate the antibacterial effectiveness of the photoactivated disinfection by using the toluidine blue O and a low- energy light emitting diode (LED) lamp . Materials and method: Sixty single rooted extracted teeth were decoronated, instrumented, irrigated, sealed at the apex and contaminated with endodontic anaerobic bacteria for 7 days to form biofilms in prepared root canals. Group I. Twelve teeth were medicated by photosensitizer (toluidine blue O) solution activated by diode lamp (FotoSan; CMS Dental, Copenhagen, Denmark).Group II. Twelve teeth were medicated by the tricr
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More