Preferred Language
Articles
/
9xaq34sBVTCNdQwCi-IF
New Metal Complexes with AZO ligand; Synthesis, Spectral Characterisation and Biological Evaluation

The new Azo ligand and its metal complexes have been prepared and characterized The reaction of 4-nitroaniline and 2-hydroxy-1-naphthaldehyde in a 1: 1 mole ratio resulted in the synthesis of ((E)-2-hydroxy-3-((4-nitrophenyl) diazenyl)-1-naphthaldehyde)(HL). The separation of monomeric complexes was accomplished by reacting ((E)-2-hydroxy-3-((4-nitrophenyl) diazenyl)-1-naphthaldehyde)(HL) with Cr, Mn II, Co II, Ni II, and Cu II metal ions in a mole ratio of 2: 1 (L: M). Elemental microanalysis, magnetic susceptibility, conductance, FT-IR, electronic spectra, and 1 HNMR, 13 C-NMR, and mass spectra were among the analytical and spectroscopic techniques used to describe the products. Based on the data collected during the characterization process, six coordinates were determined. The ligand and its complexes were tested against certain bacteria and fungi. The findings acquired suggested that the metal complexes are more active against a variety of organisms have been studied as compared to the free ligand.

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Denotation of Stanza and couplet between the two sonnets

The stanza in the sonnet has been defined as a set of poetic lines followed after proem
and be the same meter as that of proem in complete stanza, but in rhyme scheme different
from that meter. The couplet is defined as set of poetic lines that followed the stanza and be as
the same meter as that of stanza, but with different rhyme scheme. This definition is approved
by all specialized in field of Andalus literature and it was also proven to them that this
construction emptied of indications. This meter has endeavored to prove that that there were a
difference in denotation for meaning between the stanza and couplet. Thus, the sonneteers
have outweighed the sonnet of the blind "Tutaili" to their sonnets as they felt

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
Illation for the Groups SL(2,112 ) and SL(2,132 )

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 10 2019
Journal Name
Applied Physics A
Characterization and nanocrystalline growth of a-Ge:In/c-GaAs

Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Oct 14 2016
Journal Name
International Journal For Computational Methods In Engineering Science And Mechanics
Simultaneous determination of time-dependent coefficients and heat source

Scopus (15)
Crossref (12)
Scopus Crossref
View Publication
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Audio compression using transforms and high order entropy encoding

<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low &amp; multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.

... Show More
Scopus (7)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
How to Improve Workforce Development and Sustainability in Construction

Scopus (9)
Crossref (4)
Scopus Crossref
View Publication
Publication Date
Tue Mar 10 2020
Journal Name
Journal Of Inverse And Ill-posed Problems
Direct and inverse source problems for degenerate parabolic equations
Abstract<p>Degenerate parabolic partial differential equations (PDEs) with vanishing or unbounded leading coefficient make the PDE non-uniformly parabolic, and new theories need to be developed in the context of practical applications of such rather unstudied mathematical models arising in porous media, population dynamics, financial mathematics, etc. With this new challenge in mind, this paper considers investigating newly formulated direct and inverse problems associated with non-uniform parabolic PDEs where the leading space- and time-dependent coefficient is allowed to vanish on a non-empty, but zero measure, kernel set. In the context of inverse analysis, we consider the linear but ill-pose</p> ... Show More
Scopus (20)
Crossref (13)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Mar 20 2021
Journal Name
Agroforestry Systems
Hydraulic lift: processes, methods, and practical implications for society

Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD