The results of synthesizing a novel tridentate Schiff-base ligand and its metal complexes have been given. The ligand itself is described as being tridentate. The synthesis of the ligand has the following chemical formula: (E)-2- ((2S)-4-(tert-butyl) -2-((S)-(phenylamino) (p-tolyl) methyl) cyclohexylidene) hydrazine -1-carboxamide was produced as a byproduct of the reaction between benzoic acid and benzoic acid between (((4-(tert-butyl)-2-((S)-(phenylamino)(p-to and (HL). The ligand was reacted with 1:1 (L:M) mole ratios of ions containing Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Cd(II), which resulted in the production of title complexes. In cases where it was necessary, physicochemical techniques were utilized to characterize both the ligand and the complexes. Examples include magnetic susceptibility and conductance measurements, microanalysis of elements, nuclear magnetic resonance (1H, 13C), mass spectrometry, Fourier transform infrared (FT-IR), electronic spectra, and more. The results of these studies demonstrated that the ions Mn (II), Co (II), Cu(II), Ni(II), Zn(II), and Cd(II) can be partitioned into four-coordinate and six-coordinate complexes, respectively. In addition, the TGA was used to investigate whether or not the ligand and specific complexes were thermally stable. Several different bacterial and fungus strains were utilized to examine the ligand and its complexes for potential antibacterial activity. According to the findings, the complexes are far more effective than the free ligand in combating a wider variety of species.
This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreThe present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain oc
... Show MoreThe main idea of this paper is to define other types of a fuzzy local function and study the advantages and differences between them in addition to discussing some definitions of finding new fuzzy topologies. Also in this research, a new type of fuzzy closure has been defined, where the relation between the new type and different types of fuzzy local function has been studied
The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.
This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir
... Show MoreTrialeurodes irakensis sp. n. is describe and illustrated from Iraq. T.vaporariorurn (westwood)
is reported and for the first time for the Iraqi fauna. A ke to species of Trialeurodes found in
Iraq is presented.
There are many aims of this book: The first aim is to develop a model equation that describes the spread of contamination through soils which can be used to determine the rate of environmental contamination by estimate the concentration of heavy metals (HMs) in soil. The developed model equation can be considered as a good representation for a problem of environmental contamination. The second aim of this work is to design two feed forward neural networks (FFNN) as an alternative accurate technique to determine the rate of environmental contamination which can be used to solve the model equation. The first network is to simulate the soil parameters which can be used as input data in the second suggested network, while the second network sim
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More