Schiff bases, named after Hugo Schiff, are aldehyde- or ketone-like compounds in which the carbonyl group is replaced by imine or azomethine group. They are widely used for industrial purposes and also have a broad range of applications as antioxidants. An overview of antioxidant applications of Schiff bases and their complexes is discussed in this review. A brief history of the synthesis and reactivity of Schiff bases and their complexes is presented. Factors of antioxidants are illustrated and discussed. Copyright © 2016 John Wiley & Sons, Ltd.
A new ligand [N- (1,5- dimethyl -3- oxo- 2 – phenyl - 2 ,3 – dihydro -1H- pyrazol -4- ylcarbamothioyl) acetamide] (AAD) was synthesized by reaction of acetyl isothiocyanate with 4-aminoantipyrine, The ligand was characterized by micro elemental analysis C.H.N.S., FT-IR ,UV-Vis and 1H-13CNMR spectra, some transition metals complex of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were [M(AAD)2(H2O)2]Cl2 (M+2 = Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral.
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreWastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show MoreThe plant occupied the largest area in the biosynthesis of silver nanoparticles, especially the medicinal plants, and it has shown great potential in biotechnology applications. In this study, green synthesis of silver nanoparticles from Moringa oleifera leaves extract and its antifungal and antitumor activities were investigated. The formation of silver nanoparticles was observed after 1 hour of preparation color changing. The ultraviolet and visible spectrum, Fourier transform infrared spectroscopy, X-ray diffraction, scanning electron microscopy, and transmission electron microscopy techniques were used to characterize synthesis particles. Ultraviolet and visible spectroscopy showed a silver surface plasmon resonance band at 434
... Show MoreCopper (I) complex containing folic acid ligand was prepared and characterized on the basis of metal analyses, UV-VIS, FTIR spectroscopies and magnetic susceptibility. The density functional theory (DFT) as molecular modeling calculations was used to determine the donor atoms of folic acid ligand which appear clearly at oxygen atoms binding to hydrogen. Detection of donation sights is supported by theoretical parameters such as geometry, mulliken population, mulliken charge and HOMO-LUMO gap obtained by DFT calculations.
This study was aimed to assess the impact of vermicompost, glutathione, and their interaction on beetroot (Beta vulgaris L.) growth, yield, and antioxidant traits. The experiment carried out at vegetable field of the College of Agricultural Engineering Sciences - University of Baghdad during fall season 2019. The experiment was conducted using factorial arrangement within Randomized Complete Block Design with two factors and three replicates (3X3X3). Applying vermicompost before cultivation represented the first factor (0, 15, 30 ton.ha-1), which symbolized (V0, V1, V2). Glutathione (0, 75, 150 mg.L-1) which symbolized (G0, G1, G2) represented the second factor. Results showed the superiority of secondary interaction treatment V2G2
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More