A series of liquid crystals comprising a heterocyclics dihydro pyrrole and 1,2,3-triazole rings [VII]-[X] were synthesized by many steps starting from a reaction of 3,3'-dimethyl-[1,1'-biphenyl]- 4,4'-diamine with chloroacetyl chloride in a mixture of solutions DMF and TEA to synthesise the compounds [I], then the compounds [I] reacted with malononitrile in 1,4-dioxane and TEA solutions to produce compounds [II], then the first step is repeated with compound [II] where it reacted with chloroacetyl chloride in mixture of DMF and TEA to give compound [III], this compound reacted with sodium azide in the presence of sodium chloride and DMF as solvent to produce the compound [IV], which reacted with acrylic acid by a 1.3 dipolar reaction in solvent THF to give compound [V], this compound which reacted with thionyl chloride to gave carbonyl chlorides compound [VI], finally the last compound reacted with a variety of amines to product compounds [VII]a-d. The structures of the synthesized compounds were actually determined by Fourier-transform infrared spectroscopy FT-IR and Proton nuclear magnetic resonance 1H-NMR, The properties of liquid crystalline were characterized by hot stage Polarising Optical Microscope POM. The synthesized molecules exhibited enantiotropic liquid crystal phases, and the compounds [VII]a-d exhibited an enantiotropic nematic phase only.
A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiomet
... Show MoreIn this work, an important sugar alkynyl ether has been synthesized in two subsequent steps starting from commercially available D-galactose (3). This kind of compounds is highly significant in the synthesis of biologically active molecules such as 1,2,3-triazole and isoxazoles. In the first step, galactose (3) was reacted with acetone in the presence of anhydrous copper (II) sulfate to produce 1,2:3,4-di-O-isopropylidene-α-D-galactose (4) in good yield. The latter was reacted with excess of 3-bromoprop-1-yne in DMF in the presence of NaOH pellets to afford the target molecule 5 in a very good yield. The temperature of this step is crucial in determining the reaction yi
... Show Moreتم في هذا البحث استخدام المحفز الجديد المصنع من تحميل دقائق البلاتين النانوية على سطح الصفائح النانوية للكرافين كمحفز ضوئي واختباره لدراسة التجزئة الضوئية لملوثات المياه وازالتها بشكل نهائي من مصادر المياه لما لها من تأثير سلبي على البيئة. حيث تم استخدام صبغة البروموفينول الأزرق كمثال على أحد الملوثات. في البدء تم التأكد من تحضير المحفز بالطريقة المستخدمة في طريقة العمل من خلال تشخيصه باستخدام عدد من ا
... Show MoreBackground: The isatin molecule is present in many natural substances, including plants and animals, and is used to prepare compounds with various biological activities. Objectives: To synthesize a new series of isatin derivatives with the expectation that they will have antimicrobial activity. Methods: Thiazole Schiff bases were synthesized from various Mannich bases of isatin to evaluate their antimicrobial properties. Initially, Mannich bases (2a–e) were synthesized by reacting isatin with formaldehyde and different secondary amines. Subsequently, they were treated with 2-aminothiazole to yield the final compounds (3a–e). Spectroscopic characterization was done via FT-IR and 1H-NMR. The antimicrobial screening was conducted o
... Show Moreتم في هذا البحث استخدام المحفز الجديد المصنع من تحميل دقائق البلاتين النانوية على سطح الصفائح النانوية للكرافين كمحفز ضوئي واختباره لدراسة التجزئة الضوئية لملوثات المياه وازالتها بشكل نهائي من مصادر المياه لما لها من تأثير سلبي على البيئة. حيث تم استخدام صبغة البروموفينول الأزرق كمثال على أحد الملوثات. في البدء تم التأكد من تحضير المحفز بالطريقة المستخدمة في طريقة العمل من خلال تشخيصه باستخدام عدد من ا
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreRecently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show More