Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl) amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones(5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones wassecerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds(5a) showed mild antibacterial activit
... Show MoreHistone deacetylase inhibitors with zinc binding groups often exhibit drawbacks like non-selectivity or toxic effects. Thus, there are continuous efforts to modify the currently available inhibitors or to discover new derivatives to overcome these problems. One approach is to synthesize new compounds with novel zinc binding groups. The present study describes the utilization of acyl thiourea functionality, known to possess the ability to complex with metals, to be a novel zinc binding group incorporated into the designed histone deacetylase inhibitors. N-adipoyl monoanilide thiourea (4) and N-pimeloyl monoanilide thiourea (5) have been synthesized and characterized successfully. They showed inhibition of growth of human colon adenoc
... Show MoreAbstract
The use of electronic valves is commonly available. yet, the most
common is the techniques of communications as prod casting transmitter that
are used by these valves in addition to their use in communication tools as far
distance telephone, electronic measuring techniques , and others.
In this study, an attempt is endeavored for improving the efficiency of the
vacuum micro- valves(GI-19b) through activating their internal surfaces by the
use of ionic pumping which is used for treating valves which are out of order
(because of sedimentation some materials and oxide on its poles). The
existence of these materials and oxide increase the sum of current leakage
moving in between. The use of ionic pumpin
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreWhat has reached us from this great heritage left by our scientists book ((masterpiece of honor by knowing the parties)) to the conservative privilege, which Imam Safadi said ((Sheikh of time, and the preservation of the era, and critic of the time, if his son Ibn Makola had a drink and eaten, and make it to him So, after trusting in God, I thought that I should write a paper highlighting the life of this great world and explaining its methodology in this useful book in which Imam Ibn Hajar al-Asqalani said: `` The use of it took place east and west, and the scholars competed in collecting it after. And soon)).
This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show More