Transition metal complexes of Y(III), La(III) and Rh(III) with azo dye 2,4-dimethyl-6(4-nitro-phenylazo)-phenol derived from 4-nitroaniline and 2,4-dimethylphenol were synthesized. Characterization of these compounds has been done on the basis of elemental analysis, electronic data, FT-IR,UV-Vis and 1HNMR, as well as conductivity measurements. The nature of the complexes formed were studies following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1x10-4- 3x10-4). High molar absorbtivity of the complex solutions were observed. From the analytical data, the stoichiomerty of the complexes has been found to be 1:3 (Metal:ligand). On the basis of Physicochemical data octahedral geometries were a
... Show Moreتم تحضير ثلاث معقدات جديدة Ni (II)و Cu (II) و Zn (II) باستخدام الليكند المحضر الجديد من تفاعل حامض مالونيك ثنائي هيدرازايد مع 2-بيريدين كربوكسالديهايد. حيث شخصت المعقدات لمحضرة وكذلك الليكند باستخدام تقنيات مختلفة مثل FT-IR و UV-Vis و Mass و 1H-NMR و 13C-NMR وتحليل العناصر CHN و تقدير محتوى الكلور والموصلية المولارية والحساسية المغناطيسية والامتصاص الذري لتشخيص هذه المركبات. لكل معقد محضر جديد من النيكل والنحاس والزنك ، كشفت نتائج ا
... Show MoreThe integral breadth method has been utilized to analyse line
proIiles broadening and lattice strain of CaO at different temperatures
The effect of tcmperattre on crystallite size and strain has also been investigated . The crystall i tes are found to be highly anisotropic even at high temperatures
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More