The results of synthesizing a novel tridentate Schiff-base ligand and its metal complexes have been given. The ligand itself is described as being tridentate. The synthesis of the ligand has the following chemical formula: (E)-2- ((2S)-4-(tert-butyl) -2-((S)-(phenylamino) (p-tolyl) methyl) cyclohexylidene) hydrazine -1-carboxamide was produced as a byproduct of the reaction between benzoic acid and benzoic acid between (((4-(tert-butyl)-2-((S)-(phenylamino)(p-to and (HL). The ligand was reacted with 1:1 (L:M) mole ratios of ions containing Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Cd(II), which resulted in the production of title complexes. In cases where it was necessary, physicochemical techniques were utilized to characterize both the ligand and the complexes. Examples include magnetic susceptibility and conductance measurements, microanalysis of elements, nuclear magnetic resonance (1H, 13C), mass spectrometry, Fourier transform infrared (FT-IR), electronic spectra, and more. The results of these studies demonstrated that the ions Mn (II), Co (II), Cu(II), Ni(II), Zn(II), and Cd(II) can be partitioned into four-coordinate and six-coordinate complexes, respectively. In addition, the TGA was used to investigate whether or not the ligand and specific complexes were thermally stable. Several different bacterial and fungus strains were utilized to examine the ligand and its complexes for potential antibacterial activity. According to the findings, the complexes are far more effective than the free ligand in combating a wider variety of species.
Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.
In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreIn this paper, we introduce the notions of Complete Pseudo Ideal, K-pseudo Ideal, Complete K-pseudo Ideal in pseudo Q-algebra. Also, we give some theorems and relationships among them are debated.
the pursue of social systems history present to us solid evidence that the collapse of that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate auto adaptation mechanism and use it excellently in the right time.
The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob
... Show MoreMorphological and phonological studies of fungal pathogen infecting alfalfa weevil Hypera postica (Gyllenhal) indicating that infection has been shown to develop along two distinct physiological lines, each culminating in the production of either conidial or resting spores, in host cadavers which are morphologically distinct. The percent of infection and epizootic development appeared to be dependent on host density. Farther evidence to entail proper correlation between conidia and resting spores suggest that these two forms of spores are stages in the development of one pathogen.
The ground state proton, neutron and matter densities andcorresponding root mean square radii of unstable proton-rich 17Neand 27P exotic nuclei are studied via the framework of the twofrequencyshell model. The single particle harmonic oscillator wavefunctions are used in this model with two different oscillator sizeparameters core b and halo , b the former for the core (inner) orbitswhereas the latter for the halo (outer) orbits. Shell model calculationsfor core nucleons and for outer (halo) nucleons in exotic nuclei areperformed individually via the computer code OXBASH. Halostructure of 17Ne and 27P nuclei is confirmed. It is found that thestructure of 17Ne and 27P nuclei have 25 / 2 (1d ) and 1/ 2 2s -dominantconfigurations, resp
... Show More