Phthalimide formation of Phthalic anhydride with various amines using microwave or without a method with the difference of the catalyst used in a prepared Phthalimide, either structure general are C6H4CONRCO and used as starting materials in synthesis several compounds derivative phthalimides are an important compounds because spectrum wide biological activities including Antimicrobial activity, anticonvulsant activity, Anti-inflammatory activity,Analgesic activity, Anti- influenza activity and Thromboxane inhibitory activity
The polyaniline powder was chemically manufactured by direct oxidation of aniline. The resulting polymer was characterized by the results of optical, measurements by (FT-IR) spectroscopy, we have detected some of the absorption peaks located at 3498, 2858 cm-1, which correspond N-H vibrations, and C-H expansion of the aromatic ring respectively as well as stretching vibrations of quinoid ring have been observed. Structural properties, such as the surface topography using an atomic force microscope (AFM), and Surface composition by (SEM) have been studied. The structure of some pellets of polyaniline powder have been examined by using analytical X-ray diffraction technique, the pattern of obse
... Show MoreA series of lanthanide metal (???) complexes have been prepared from the new azo ligand, 3-(1-methyl-2-benzimidazolylazo)-Tyrosine (MBT). The structural feature were confirmed on the basis of their elemental analysis, metal content, molar conductance, magnetic measurement, FTIR, 1 HNMR and UV-Vis spectra studies. The isolated complexes were found to have a mole ratio (1:2) (metal:ligand) stoichiometry with the general formula [Ln(MBT)2]Cl (Ln(???) = La, Ce, Pr, Nd, Sm, Eu and Gd). The chelates were found to have octahedral structures. The FTIR spectra shows that the ligand (MBT) is coordinated to lanthanide ions as a N, N, O-tridentate anion via benzimidazole nitrogen, azo nitrogen and oxygen of hydroxyl after deprotonation. Com
... Show MoreABSTRACT
This research included the preparation and characterization of new demulsifies from natural and synthetic polymers of chitosan and polyvinyl alcohol that are environmentally friendly and at the same time have high efficacy comparable to emulsifiers. imported foreign. The prepared compounds were examined using infrared spectroscopy and nuclear magnetic resonance spectroscopy, and all the spectral signals of the polymers were in good agreement with the chemical composition of the polymers. And the melting and decomposition that occur on polymers at high temperatures. The effect of the length and type of side chain in the compositions of polymers on the process of water separation of oil emulsions w
... Show MoreThe study aims to review the literature on the fundamental changes in Managerial Accounting (MA) in light of accelerating Digital Transformations (DT) and increasing Sustainability Requirements (SR) from 2020 to August 2025, with the purpose of informing researchers and professionals about recent developments. The study relied on a qualitative analysis of the content of a group of studies indexed in the Scopus database. The study included a literature review of topics such as artificial intelligence tools and techniques, cloud computing, linear programming, sustainability reporting, and strategic managerial accounting practices. The study results revealed that accelerated DT improves the efficiency of managerial accounting practices
... Show Moreole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show Moreole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More