A variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).
This work represents the preparation of the starting material, 3-chloro-2-oxo-1,4-dithiacyclohexane (S) using a new method. This material was reacted with, 4-phenylthiosemicarbazide to give (H3NS3) as a tetradentate ligand H3L. New complex of rhenium (V) with this ligand of the formula [ReO(L)] was prepared. New complexes of the general formula [M(HL)] of this ligand when reacted with some metal ions where: M = Ni(II), Cu(II), Cd(II), Zn(II), Hg(II) have been reported. The ligand and the complexes were characterized by infrared, ultraviolet–visible, mass, 1H nuclear magnetic resonance and atomic absorption spectroscopic techniques and by (HPLC), elemental analysis, and electrical conductivity. The proposed structure for H3L with Re (V) i
... Show MoreA phosphorus‐containing Schiff base was prepared from bis{3‐[2‐(4‐amino‐1,5‐dimethyl‐2‐phenylpyrazol‐3‐ylideneamino)ethyl]indol‐1‐ylmethyl}phosphinic acid and paraformaldehyde as a novel antibacterial compound. The reaction of the Schiff base ligand with VO(IV), Ni(II), Co(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II) and Pt(IV) led to binuclear species of metal complexes, depending on the ratio of metal ion and ligand. The ligand and its complexes were investigated using elemental analysis, Fourier transform infrared, 1H NMR, 13C NMR, UV–visible and mass spectra, thermogravimetric analysis, conductivity measurements and thermal analysis. The results showed that the S
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreThe present work involved synthesis of several new N-Sulfamethoxazol derivatives imide on Polymeric chain by two steps. The first stip involved preparation of N- (sub.orunsub benzoyl and sub unsub acetyl) amidyl sub sulfamethoxazole (1-5) by condensation of sulfamethoxazole drug with many substituted acid chloride, then the second step include, preparation new five N-(acrly-N–sub or unsub benzoyl) imidyl substituted sulfamethoxazol(6-10) by reaction of poly acryloyl chloride with the prepared compound (1-5) in first stepin asuitable solvent in the presenceamount triethylamine (Et3N) with heating. The structure confirmations of all polymers wereconfirmed using FT-IR,1H-NMR,13C-NMR and UV spectroscopy. Other physical properties including so
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More