In this study, new heterocyclic compounds were synthesized through the cyclization reactions of o-phenylenediamine (1) with various organic reagents. Benzodiazepine derivatives (2-4) were obtained by reaction of (1) with ethylacetoacetate, malonic acid and acetyl acetone.Treatment of compound (1) with chloroacetamide, chloroacetic acid, p-bromophenacyl bromide and oxalic acid dihydrate afforded quinoxaline derivatives (5-8), respectively. Reaction of compound (1) with benzoic acid, piperonal, cyclohexanone and carbon disulfide resulted in the formation of compounds (9-12), respectively. Finally, reaction of compound (12) with chloroacetic acid in the presence of potassium hydroxide produced compound (13).
The present study introduces description of a new species of genus Arboridia Zakhvaticin 1946, based on a large collection of Cicadellids. External morphological characters particularly male genitalia were discussed and illustrated. The genus Arboridia Zalchvatkiia (Typhlocybinae: Erythroneurini) contains small slender, fragil and attractively coloured and patterned leafhoppers. It was erected by Zakhvatkin in 1946 (Zalchvatkin, 1946). The overall length of adults ranges from 2.5 to 3.4 mm. Members of this genus can be recognized by inner apical cell of forewing which is long with oblique base; Cu confluent with this base at a point near the middle of the length of inner apical cell; two prominent circular deep brown spots on vertex (Zal
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThis article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq. A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province. A short morphological description is presented.
This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.