Novel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff bases. The prepared analogues were characterised by FT-IR, 1H NMR, 13C NMR, HRMS(EI+ ) spectra. These analogues were tested against different bacteria to evaluate them as antimicrobial agents
It is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MoreThis study addresses quantum computers as one of the most significant contemporary technological transformations that promise to reshape the future of global computing. It aims to clarify the conceptual foundations of quantum computing and to identify the fundamental differences between quantum and classical computers in terms of processing mechanisms, computational speed, and the ability to solve highly complex problems. The study focuses on key concepts such as the qubit, superposition, and entanglement, highlighting their role in enabling computational capabilities that exceed the limits of classical computing. It also discusses the future applications of quantum computers in areas such as cryptography, artificial intelligence, big data
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreWith occurrence of any financial crises, regardless at global or regional levels such as the great economic crises during 1929 – 1933 and the Asian financial crises at the end of twentieth century as well as the current global financial crises that started during second half 2008, we acknowledge that there are some critics loudly articulated accusing accountants and auditors for disparences, and they are numerical partner of financial manipulation as well as corrupted administrators with the company's administrators that they are difficulty. At this point, many suggestions and recommendation for upgrading the accounting system has been made.  
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More