A new ligand containing a dioxime derivatives,(H2L)(1) Namely P-phenylenediamine–N, N'-bis (2-butylidine-3-one oxime) has been prepared by condensation reaction of 2, 3-butanedion mono oxime (2) with 1, 4–diaminobenzene. The titled ligand (H2L) was used to prepare some metal ions complexes namely Co (II), Ni (II) and Cu (II). This ligand and its complexes were confirmed by FT-ir,(UV-Vis.), mass spectroscopy,( 1 H, 13 CNMR) and elemental micro analysis (CHN), molar conductance, element content and melting point measurement. It was concluded that the geometry around Cu (II) and Co (II) complexes were distorted tetrahedral geometry while Ni (II) complex was a square planer.
The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The
... Show MoreIn the present study, we have reported investigations on the effect of simultaneous substitution of Tl at the Hg site in the oxygen deficient HgOδ layer of Hg1-xTlxBa2Ca2Cu3O8+ δ cuprate superconductor. Bulk polycrystalline samples were prepared by the two-step solid state reaction process. It was observed that the grown Hg1-xTlxBa2Ca2Cu3O8+ δ corresponds to the 1223 phase. Electrical resistivity, using four probe technique, is used to find the transition temperature Tc. The highest Tc(0ffset) were 108, 102,113, 118, 125 and 121K for Hg1xTlxBa2Ca2Cu3O8+ δ with x = 0.0, 0.05, 0.10, 0.15, 0.20 and 0.25 respectively. The optimum Tc(off) of ~ 125 K and Tc(onset) ~ 136K was fo
... Show MoreAbstract
Endophytic fungi are gaining interest as sources of novel bioactive metabolites.
The study was carried out to screen and isolate endophytic fungus.An endophytic
fungus isolated from root of calyptous plant .The fungus was identified as
Stemphylium radicinum (Meier, Drechs and Eddy)based on morphological
characterization. Fungal secondary metabolites was carried out by ethyl acetate
solvent.The antibacterial activity was tested against five bacterial isolates.
Esherichia coli, Staphylococcus aureus, Proteus vulgaris, Klebsiella pneumonia and
Streptococcus pyogenes by using a disc diffusion technique. The inhibition zones
exhibited by Fungal secondary metabolites were ranged between 22.5-35.5 mm.
Mini
This work involves synthesis of some new heterocyclic compounds including 1, 3-diazetine. The new Schiff bases [VI] ad derived from 3-((5-hydrazinyl-4-phenyl-4H-1, 2, 4-triazol-3-yl) methyl)-1H-indole [V] which was synthesized by refluxing 5-((1H-indol-3-yl) methyl)-4-phenyl-4H-1, 2, 4-triazole-3-thiol [IV] with hydrazine hydrate in absolute ethanol and this amino compound [V] condensation with different aromatic aldehydes in absolute ethanol to yielded a new Schiff bases [VI] ad. N-acyl compounds [VII] ad were synthesized by addition reaction of acetyl chloride to imine group of Schiff bases in dry benzene. The new diazetine derivatives [VIII] ad synthesized by the reaction of N-acyl compounds [VII] ad with sodium azide in dimethylformamid
... Show MorePolypyrrole/silver (PPy/Ag) nanocomposites was synthesized via a chemical oxidative method. The AFM analysis is performed to study the surface roughness, morphology and size distribution of the PPy particles and PPy-ag nanocomposites. The results indicated that as the concentration of Ag in the nanocomposite increases, the roughness also increases. The size of nanoparticles was also evaluated and found in the range of 15 nm to 125 nm. The PPy/Ag nanocomposites exhibited an effectiveness against Gram-negative Escherichia coli showing an inhibition zone of 4mm and displayed poor efficacy against Gram-positive Staphylococcus aureus. Based on given adequate antibacterial characteristics of PPy/Ag nanocomposites, it can be identified as
... Show MorePolypyrrole/silver (PPy/Ag) nanocomposites was synthesized via a chemical oxidative method. The AFM analysis is performed to study the surface roughness, morphology and size distribution of the PPy particles and PPy-ag nanocomposites. The results indicated that as the concentration of Ag in the nanocomposite increases, the roughness also increases. The size of nanoparticles was also evaluated and found in the range of 15 nm to 125 nm. The PPy/Ag nanocomposites exhibited an effectiveness against Gram-negative Escherichia coli showing an inhibition zone of 4mm and displayed poor efficacy against Gram-positive Staphylococcus aureus. Based on given adequate antibacterial characteristics of PPy/Ag nanocomposites, it can be identified as a pro
... Show MoreTwo hundred and ten specimens include urine, blood and ear swab were collected from different hospitals in Baghdad city; 85 (40%) isolates were diagnosed as Proteus spp. with (82%), (11.7%) and (5.8%) represented in urine, blood and ear swab specimens respectively. PCR technique was shown 30 (35.3%) isolates were positive for specific Urease C gene that used in rapid detection of Proteus vulgaris. The ability for chondritinase production was checked invetro and invevo, 24 (80%) isolates of P. vulgaris were showed ablity to chondritinase production and the isolate (p17) has higher enzyme activity value to (175.2U/ml). The Chondroitinase was purified by three short steps only included precipitate with 60% saturated of ammonium sulfate, dia
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More