Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl)amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones (5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones was secerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds (5a) showed mild antibacterial activity. Compounds (5d–i) did not display notable activity. The molecular docking of synthesised compounds were tested inside the pocket of bacterial gyrase enzyme target site by using MOE 2015 software, which acts as Adenosine triphosphate (ATP)-binding domain bacterial gyrase enzyme pocket and novobiocin was used as reference.
Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show MoreIn the present work, the thermo-fluid characteristics of a heat exchanger formed of helical coiled tubes immersed in cold water are investigated experimentally. Two types of helical coiled tube are tested, a conventional vertical single helical coiled tube and a new triple vertical helical coiled tube in parallel connection called as meshed coils. The effect of hot water flow rates inside the tubes (ranges from 2.67 to 7.08 l/min), and its inlet temperatures (namely 50, 60, 70 and 80 °C) are investigated. The experimental results show that increasing the flow rate inside the meshed coils leads to decrease the temperature difference between inlet and outlet. An enhancement of heat transfer for meshed coils compared to single coil has been n
... Show MoreNanocrystalline ZnO/Zeolite type A composite was prepared by simple method of operation by . the precipitation of zinc oxide and loading on zeolite 5A in one step. Characterization was made by X-ray diffraction (XRD), X-ray fluorescence(XRF), N2 adsorption- desorption for BET surface area, and Atomic force microscopy (AFM). Results showed that zinc oxide was loaded on zeolite as noticed by the characteristic peaks and was of nano scale having an average diameter of 88.57nm. The percentage loading of ZnO on zeolite A was 28.37% and the surface area was 222m2/g. The activity of the prepared catalyst was examined in the desulfurization of double hydrogenated diesel fuel. The process was investigated in a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe new ligand [N1,N4-bis((1H-benzo[d]Glyoxalin-2-yl)carbamothioyl)Butanedi amide] (NCB) derived from Butanedioyl diisothiocyanate with 2-aminobenz imidazole was used to prepare a chain of new metal complexes of Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Ag(I), Cd(II) by general formula [M(NCB)]Xn ,Where M= Cr(III), n=3, X=Cl; Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Cd(II) ,n=2 , X=Cl; Ag(I), n=1, X=NO3. Characterized compounds on the basis of 1H, 13CNMR (for (NCB), FT-IR and U.V spectrum, melting point, molar conduct, %C, %H, %N and %S, the percentage of the metal in complexes %M, Magnetic susceptibility, thermal studies (TGA),while its corrosion inhibition for mild steel in Ca(OH)2 solution is studied by weight loss. These measureme
... Show MoreA new poly chain derivative of polyacrolein has been synthesized from the two basic precursors, polyacrolein and aromatic amine/substituted amine in chloroform to prepare poly Schiff base compounds (A1-A4). The novel poly subs.β-lactam derivative is obtained via coupling of poly schiff base with chloroacetyl chloride and trimethylamine (B1-B4). Newly synthesized compound was identified via spectral methods; their [13C-NMR, 1H-NMR, and FTIR] also measurement of some of its physical properties. Furthermore the inhibition effect of synthesized compounds (B1-B4) on the corrosion of stainless steel in 1N HCl was studied by wight loss method. The results of weight loss measurements showed that corrosion inhibition efficiency by increasing the co
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w
... Show More