New Schiff-base ligands bearing tetrazole moiety and their polymeric metal complexes with Co(II), Ni(II) and Cd(II) ions are reported. Ligands were prepared in a multiple-step reaction. The reaction of sodium 2,6- diformylphenolate and cyclohexane-1,3-dione with 5-amino-2-fluorobenzonitrile resulted in the isolation of two precursors sodium 2,6-bis((E)-(3-cyano-4-fluorophenylimino)methyl)-4-methylphenolate 1 and 5,5'- (1E,1'E)-cyclohexane-1,3-diylidenebis- (azan-1-yl-1-ylidene)bis(2-fluorobenzonitrile) 2, respectively. The reaction of precursors with azide gave the required ligands; sodium 2,6-bis((E)-(4-fluoro-3-(1H-tetrazol-5- yl)phenylimino)methyl)-4-methylphenolate (NaL) and (N, N'E, N, N'E)-N, N'-(cyclohexane-1,3-diylidene)bis(4- fluoro-3-(1H-tetrazol-5-yl)aniline) (L1). The reaction of these ligands with the appropriate metal ions gave polymeric metal complexes of the formulae {[M2(L)]Cl}n and [M(L1)Cl2]n (where M = Co(II), Ni(II) and Cd(II)). A range of techniques were used to confirm the entity of ligands and their complexes. The formation of ligands and mode of complexation and geometrical structure of the title polymeric complexes were verified using FTIR, electronic spectra, NMR, ESMS, magnetic susceptibility, micro-elemental analysis, metal content, chloride content and conductance. The analytical and spectroscopic data indicated the formation of four-coordinate complexes, with a tetrahedral geometry for Co(II) and Cd(II), and square planer for Ni(II) in L- and L1 complexes. Biological evaluation of ligands and their polymeric complexes against gram-positive bacteria (G+), Bacillus stubtili, Staphylococcus aureus, and gram-negative bacteria (G-), Escherichia coli and Pseudomonas aeruginosa, showed ligands and their polymeric metal complexes have a good effect on the screened bacteria.
In this paper, fire resistance and residual capacity tests were carried out on encased pultruded glass fiber-reinforced polymer (GFRP) I-beams with high-strength concrete beams. The specimens were loaded concurrently under 25% of the ultimate load and fire exposure (an increase in temperature of 700 °C) for 70 min. Subsequently, the fire-damaged specimens were allowed to cool and then were loaded statically until failure to explore the residual behaviors. The effects of using shear connectors and web stiffeners on the residual behavior were investigated. Finite Element (FE) analysis was developed to simulate the encased pultruded GFRP I-beams under the effect of fire loading. The thermal analyses were performed using the general-pu
... Show MoreA demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreIn this work, pure and doped Vanadium Pentoxide (V2O5) thin films with different concentration of TiO2 (0, 0.1, 0.3, 0.5) wt were obtained using Pulse laser deposition technique on amorphous glass substrate with thickness of (250)nm. The morphological, UV-Visible and Fourier Transform Infrared Spectroscopy (FT-IR) were studied. TiO2 doping into V2O5 matrix revealed an interesting morphological change from an array of high density pure V2O5 nanorods (~140 nm) to granular structure in TiO2-doped V2O5 thin film .Transform Infrared Spectro
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show More