The results of synthesizing a novel tridentate Schiff-base ligand and its metal complexes have been given. The ligand itself is described as being tridentate. The synthesis of the ligand has the following chemical formula: (E)-2- ((2S)-4-(tert-butyl) -2-((S)-(phenylamino) (p-tolyl) methyl) cyclohexylidene) hydrazine -1-carboxamide was produced as a byproduct of the reaction between benzoic acid and benzoic acid between (((4-(tert-butyl)-2-((S)-(phenylamino)(p-to and (HL). The ligand was reacted with 1:1 (L:M) mole ratios of ions containing Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Cd(II), which resulted in the production of title complexes. In cases where it was necessary, physicochemical techniques were utilized to characterize both the ligand and the complexes. Examples include magnetic susceptibility and conductance measurements, microanalysis of elements, nuclear magnetic resonance (1H, 13C), mass spectrometry, Fourier transform infrared (FT-IR), electronic spectra, and more. The results of these studies demonstrated that the ions Mn (II), Co (II), Cu(II), Ni(II), Zn(II), and Cd(II) can be partitioned into four-coordinate and six-coordinate complexes, respectively. In addition, the TGA was used to investigate whether or not the ligand and specific complexes were thermally stable. Several different bacterial and fungus strains were utilized to examine the ligand and its complexes for potential antibacterial activity. According to the findings, the complexes are far more effective than the free ligand in combating a wider variety of species.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreOsteoarthritis (OA) is the most common degenerative joint disorder that ultimately results in the progressive destruction of articular cartilage. The occurrence of knee osteoarthritis (OA) increases with obesity and is more common in women compared with men. Thirty patients (20 females, 10 males) clinically diagnosed with knee OA admitted to Baghdad teaching hospital between January 2015-June 2015. Patients between 35-70 year of age and 30 healthy subject (20 females, 10 males) ages matched. The results showed that increased body mass index (BMI) is a well-recognized risk factor for knee osteoarthritis, and the effect of obesity is a stronger predictor of developing knee OA symptoms in women than men. There was also a significant diffe
... Show MoreThe Rate theory of crack growth in PVC pipe has been studied for creep and fatigue crack propagation. Rate theory function parameters, (RTFP), were estimated theoretically from exponential function parameters, (EFP), to experimental data of crack velocity versus stress intensity factor ,(V-K) diagram, to creep crack propagation . Also (RTFP) were estimated theoretically from (EFP) to experimental data of (V-?K) diagram to fatigue crack propagation. Temperature effect with (RTFP) was discussed. Crack velocity function denoted with stress intensity factor and temperature degrees has been determined to fatigue and creep crack propagation theoretically and comparative results this function with experimental data of (V-K or ?K) diagram .
A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show Moreconversation is an oral skill in which two persons can exchange their ideas, thoughts and opinions to communicate with each other. Learners can work in pairs or groups to practice dialogues chosen by the teacher from their textbook materials or from additional resources. Nowadays, because of Corona virus infection, our college students are taught all the subjects including conversation course either via google classroom platform or any other platforms. Google meet is one of online meetings between the teacher and students, i.e., a video meet in which students and the teacher join the online meetings in a specified time to communicate, express their ideas, thoughts and feelings about what is mentioned above. In this study, the resea
... Show MoreBackground and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th
... Show MoreThe concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Grabisch and Labreuche have recently proposed a generalization of capacities, called the bi-capacities. Recently, a new approach for studying bi-capacities through introducing a notion of ternary-element sets proposed by the author. In this paper, we propose many results such as bipolar Mobius transform, importance index, and interaction index of bi-capacities based on our approach.
|
Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world. The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr |