In this work, a series of new maleimides linked to substituted benzothiazole moiety were synthesized. Synthesis of these new cyclic imides were performed via three steps, the first one involved preparation of a series of 2-aminobenzothiazole substituted with different substituents via reaction of different primary aromatic amines with ammonium thiocyanate and bromine in glacial acetic acid. The prepared 2- amino benzothiozoles were introduced in the second step in reaction with maleic anhydride producing a series of N-(substituted benzothiazole-2-yl) maleamic acids.The resulted maleamic acids were dehydrated in the third step via treatment with acetic anhydride and anhydrous sodium acetate to afford a series of the desirable N-(substituted benzothiazole -2-yl) maleimides.The synthesized maleimides were screened for thier antibacterial activity against two types of bacteria including (staphylococcus aureus) Gram positive and (Klebsiella pneumoniae) Gram negative bacteria respectively.Antifungal activity of the prepared imides also were tested against (Candida albicans) fungi.The new compounds were found to exhibit good antibacterial and antifungal activities.
The research includes the preparation of a new Schiff base(4-methyl-2-((2-phenyl hydrazineylidene)methyl)naphthalen-1-ol), which was subsequently, used to prepare a series of complexes using chlorides of Mn2+, Co2+, Cu2+, Cr3+, and Fe3+ ions. The synthesized compounds were characterized using various techniques such as elemental microanalysis (C.H.N), chloride content determination using Mohr’s method, FT-IR spectroscopy, UV-Visible, mass spectra, conductivity, DSC (Differential Scanning Calorimetry), and thermogravimetric analysis. Overall, the decay of the ligand and its metal complexes was recorded to determine their thermal stability and weight-loss profiles. The results indicated that ligand acts as a bidentate doner, coordinating wi
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreAnew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.
One of the common geotechnical problems is the construction on soft soil and the improvement of its geotechnical properties to meet the design requirements. A stone column is one of the well-known techniques used to improve the geotechnical properties of soft soils. Sometimes thick layers of soft soil imposed the designer to use floating stone columns for improvement of such soil; in this case, the designer will be lost the end bearing of the stone column. In this study, the effects of several patterns of floating stone columns distribution under footing on the bearing capacity of soil and the distribution of excess porewater pressure are investigated. The soft soil used in this study has a very low undrained shear strength (cu) of
... Show More