The new Azo ligand and its metal complexes have been prepared and characterized The reaction of 4-nitroaniline and 2-hydroxy-1-naphthaldehyde in a 1: 1 mole ratio resulted in the synthesis of ((E)-2-hydroxy-3-((4-nitrophenyl) diazenyl)-1-naphthaldehyde)(HL). The separation of monomeric complexes was accomplished by reacting ((E)-2-hydroxy-3-((4-nitrophenyl) diazenyl)-1-naphthaldehyde)(HL) with Cr, Mn II, Co II, Ni II, and Cu II metal ions in a mole ratio of 2: 1 (L: M). Elemental microanalysis, magnetic susceptibility, conductance, FT-IR, electronic spectra, and 1 HNMR, 13 C-NMR, and mass spectra were among the analytical and spectroscopic techniques used to describe the products. Based on the data collected during the characterization process, six coordinates were determined. The ligand and its complexes were tested against certain bacteria and fungi. The findings acquired suggested that the metal complexes are more active against a variety of organisms have been studied as compared to the free ligand.
The stanza in the sonnet has been defined as a set of poetic lines followed after proem
and be the same meter as that of proem in complete stanza, but in rhyme scheme different
from that meter. The couplet is defined as set of poetic lines that followed the stanza and be as
the same meter as that of stanza, but with different rhyme scheme. This definition is approved
by all specialized in field of Andalus literature and it was also proven to them that this
construction emptied of indications. This meter has endeavored to prove that that there were a
difference in denotation for meaning between the stanza and couplet. Thus, the sonneteers
have outweighed the sonnet of the blind "Tutaili" to their sonnets as they felt
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show MoreDegenerate parabolic partial differential equations (PDEs) with vanishing or unbounded leading coefficient make the PDE non-uniformly parabolic, and new theories need to be developed in the context of practical applications of such rather unstudied mathematical models arising in porous media, population dynamics, financial mathematics, etc. With this new challenge in mind, this paper considers investigating newly formulated direct and inverse problems associated with non-uniform parabolic PDEs where the leading space- and time-dependent coefficient is allowed to vanish on a non-empty, but zero measure, kernel set. In the context of inverse analysis, we consider the linear but ill-pose