The present study deals with the synthesis of four different azo-azomethine derivatives; this is done by two steps; the first step is diazotization of sulfonamides (sulfanilamide, sulfacetamide, sulfamethoxazole, and sulfadiazine) separately, followed by the second step; the coupling reaction of diazotized compounds with isatin bis-Schiff base named 3-((4-nitrobenzylidene) hydrazono)indolin-2-one. The later one (bis-Schiff base) was synthesized by the reaction of 3-hydrazono-indolin-2-one with p-nitrobenzaldehyde. The chemical structures of newly synthesized compounds were approved on the basis of their FTIR, 1H-NMR, and CHNS elemental analysis data results. The synthesized azo compounds were tested in vitro for their antimicrobial potentia
... Show MoreFH Ghanim, Journal of Global Pharma Technology, 2018
Time-domain spectral matching commonly used to define seismic inputs to dynamic analysis in terms of acceleration time history compatible with a specific target response spectrum is used in this study to investigate the second-order geometric effect of P-delta on the seismic response of base-isolated high-rise buildings. A synthetic time series is generated by adjusting reference time series that consist of available readings from a past earthquake of the 1940 El Centro earthquake adopted as an initial time series. The superstructure of a 20-story base isolated building is represented by a 3-D finite element model using ETABS software. The results of the base isolated building show that base isolation technique significantly reduces inter-s
... Show MoreThe mixed ligand complexes of Schiff base ligand (Z)-2-(((4-bromo-2-methylphenyl) imino) methyl)-4-methylphenol (L) with some metals ion (II); Mn(1), Co(2), Ni(3), Cu(4), Zn(5) Cd(6) and Hg(7) and 1,10-Phenanthroline (phen) were Synthesis and characterized by the mass and 1HNMR spectrometry (ligand Schiff base), the FTIR, UV-visible and the flame atomic absorption (A.A) spectrum, the C.H.N analysis and the chlorine content, in addition to measuring the magnetic sensitivity of the complexes. All the complexes had octahedral geometry. The bioactivity activity for compounds against; Rhizopodium, Staphylococcus aureus and Escherichia coli, the compounds showed different efficacy towards these microorganisms
One of the rules concerning the control of civil transactions is the rule of no harm and harm, which was enacted by our Holy Prophet Muhammad (peace be upon him and his family). Scholars singled it out by research and investigation, and classified by non-scientists independent messages, showing the status of al-Qaeda in terms of its perception, meaning, branches and results, and the importance of this rule in the payment of damage and compensation for it has been provided by the Iraqi legislator generous within the provisions of Iraqi law in all its branches of public and private, as applied The judiciary Iraq The provisions of this rule have been issued and numerous decisions have been made to compensate for the damage and to give to ev
... Show MoreMetal complexes of Mn(II), Co(II), Ni(II), Cu(II), Cd(II), Zn(II), Hg(II), Pd(II), and Pt(II) with Schiff base ligand (LH) derived from 2,5-dichloroaniline and 2-hydroxy-5-metheylbenzalaldehyde were synthesized and characterized using a variety of spectrophotometric techniques The findings of the spectroscopic analysis indicated that (LH) behaved as a binary coordinating agent to the metal ion by the N and O atoms, and the geometry shape of the complexes was octahedral, with the exception of the Pd and Pt complexes, which had a square planar geometry. Using the DPPH radical scavenging method, we investigated the antimicrobial activity of the compound against Staphylococcus aureus and Escherichia coli, as well as the antifungal activity of t
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More