The results of synthesizing a novel tridentate Schiff-base ligand and its metal complexes have been given. The ligand itself is described as being tridentate. The synthesis of the ligand has the following chemical formula: (E)-2- ((2S)-4-(tert-butyl) -2-((S)-(phenylamino) (p-tolyl) methyl) cyclohexylidene) hydrazine -1-carboxamide was produced as a byproduct of the reaction between benzoic acid and benzoic acid between (((4-(tert-butyl)-2-((S)-(phenylamino)(p-to and (HL). The ligand was reacted with 1:1 (L:M) mole ratios of ions containing Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Cd(II), which resulted in the production of title complexes. In cases where it was necessary, physicochemical techniques were utilized to characterize both the ligand and the complexes. Examples include magnetic susceptibility and conductance measurements, microanalysis of elements, nuclear magnetic resonance (1H, 13C), mass spectrometry, Fourier transform infrared (FT-IR), electronic spectra, and more. The results of these studies demonstrated that the ions Mn (II), Co (II), Cu(II), Ni(II), Zn(II), and Cd(II) can be partitioned into four-coordinate and six-coordinate complexes, respectively. In addition, the TGA was used to investigate whether or not the ligand and specific complexes were thermally stable. Several different bacterial and fungus strains were utilized to examine the ligand and its complexes for potential antibacterial activity. According to the findings, the complexes are far more effective than the free ligand in combating a wider variety of species.
In this study, (50–110 nm) magnetic iron oxide (α-Fe2O3) nanoparticles were synthesized by pulsed laser ablation of iron target in dimethylformamide (DMF) and sodium dodecyl sulfate (SDS) solutions. The structural properties of the synthesized nanoparticles were investigated by using Fourier Transform Infrared (FT-IR) spectroscopy, UV–VIS absorption, scanning electron microscopy (SEM), atomic force microscopy (AFM), and X-ray diffraction (XRD). The effect of laser fluence on the characteristics of these nanoparticles was studied. Antibacterial activities of iron oxide nanoparticles were tested against Gram-positive; Staphylococcus aureus and Gram-negative; Escherichia coli, Pseudomonas aeruginosa and Serratia marcescens. The results sh
... Show MoreBackground: Healing of a tooth extraction socket is a complex process involving tissue repair and regeneration. It involves chemotaxis of appropriate cells into the wound, Transformation of undifferentiated mesenchymal cells to osteoprogenitor cells, proliferation and differentiation of committed bone forming cells, extracellular matrix synthesis, mineralization of osteoid, maturation and remodeling of bone. These cellular events are precisely controlled and regulated by specific signaling molecules. Some of these like transforming growth factor beta (TGF-?), vascular endothelial growth factor (VEGF), bone morphogenetic proteins (BMP) and insulin like growth factors (IGF) are well conserved proteins involved in the initial response to injur
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MoreAnew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The soil acari fauna of Citrus orchards of Baghdad in Jadiriya area was studied in a total
of forty-eight samples. Twenty-two species were recorded during the present study of which
eight species were first records to Iraq. The ordinal composition of the soil acari fauna was
predominantly Mesostigmata.
This fauna represents diverse trophic groups. The most abundant groups were the
predacious and the Microphytophagus, while the less abundant groups were the predacious/
Microphytophagus, Macrophytophagus, and Panaphytophagus. The most abundant and
frequent species were Rhizoglyphus sp. Tyrophagus putrescentiea (Scrank), Pachylaelaps
longisetis Halbt. and Stratiolaelaps miles Berl.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show More