Abstract: Mixed ligand Mn(II), Co(II), Ni(II), Cu (II), Zn(II), and Cd(II) complexes with (TMAP) Schiff base ligand and (8HQ) have been composition and analyzed. Diagnosis by, melting point, solubility, Electronic, mass and IR-spectroscopic studies, conductivity elemental, thermoanalytical analysis displayed the forming of mononuclear complexes. Spectral studies results suggest an octahedral system or the metal (II) mixed complexes. The detainments of molar conductance of the mixed complexes in DMF coincide to electrolytic nature of the mixed complexes, consequently, these complexes could be subedited as [M(TMAP)(8Q)(H2O)]nX.yH2O (M=Co(II) and Cu(II) complexes(where n = 1, y = 0 ); [M(TMAP)(8Q)(H2O)]nX.yH2O (M = (where n = 1, y = 1 for Ni(II) complex and n = 1, y = 2 for Cd(II) complex) and [M(TMAP)(8Q)(H2O)]nX.yH2O (M = Mn(II) (n = y = 2) and Fe(III) (n = 3, y = 0)). On the principle of electronic spectra, magnetic moment studies, an octahedral structure has been designated for the metal complexes. Further parameters of the thermodynamic and kinetic for the various stages of decomposition were determined to utilize the Horowitz–Metzger and Coats–Redfern ways. Then, the ligand in rapprochement to metal complexes is tested for their anticancer and antimicrobial efficacy with breastic cancer cell line. The outcomes showed that the metal complexes are more active than the parent TMAP ligand but more active than (8HQ) free ligand. In these complexes, the metal ion chalets to the ligand through the azomethine linkage, (NH2) and imine(C=N) groups of trimethoprim drug. The outcomes of conductivity related that the complexes were all 1:1 electrolytes except Mn(II) and Zn(II) complexes are non- electrolyte. The metal complexes were tested for their antimicrobial efficacies applying agar disc diffusion method and the outcomes related that they were active with bacteria pieces screened.
Female infection with HPV (human papilla virus) has been established as an essential cause of CIN (cervical intraepithelial neoplasia). The danger of transformation from CIN to frank malignancy should be considered. Objective: The goal of this study is to evaluate the effectiveness of CO2 laser vaporization of ectocervical lesion high grade squamous intraepithelial lesion (HGSIL). Patients and Methods: Four Female out of 150 affected with HGSIL lesions were submitted to CO2 laser vaporization and followed up in 4 months later, and 10 women with HGSIL lesion submitted to electrocautery diathermy for the comparison. Results: Among women treated by CO2 laser vaporization, 3 women had negative results (clear cervix), at 4 months follow up; o
... Show MoreThe paper reports the influence of annealing temperature under vacuum for one hour on the some structural and electrical properties of p-type CdTe thin films were grown at room temperature under high vacuum by using thermal evaporation technique with a mean thickness about 600nm. X-ray diffraction analysis confirms the formation of CdTe cubic phase at all annealing temperature. From investigated the electrical properties of CdTe thin films, the electrical conductivity, the majority carrier concentration, and the Hall mobility were found increase with increasing annealing temperatures.
The paper reports the influence of annealing temperature under vacuum for one hour on the some structural and electrical properties of p-type CdTe thin films were grown at room temperature under high vacuum by using thermal evaporation technique with a mean thickness about 600nm. X-ray diffraction analysis confirms the formation of CdTe cubic phase at all annealing temperature. From investigated the electrical properties of CdTe thin films, the electrical conductivity, the majority carrier concentration, and the Hall mobility were found increase with increasing annealing temperatures.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreIn this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi
... Show MoreThe preparation of the phenanthridine derivative compound was achieved by adopting an efficient one-pot synthetic approach. The condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 mole ratio resulted in the formation of the title compound. Analytical and spectroscopic techniques were used to confirm the nature of the new compound. A mechanism for the formation of the phenanthridine moiety that is based on three steps has been suggested
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More