In present project, new Schiff base of 4, 4'- (((1E, 1'E)-1,4-.phenylenebis- (methane-ylylidene))-bis-(azane-ylylidene)) bis-(5-(4-chlorophenyl) -4H -1,2,4-triazole-3-thione) (L3) has been synthesized by condensation of 4-amino-5-(4-chlorophenyl)-2,4-dihydro-3H-1,2,4-triazole-3-thione with benzene-1,4-dicarboxaldehyde. The new asymmetrical Schiff base (L3) used as a ligand to synthesize a new complex with Co(II), Ni(II), Cu(II), Pd(II), and Pt(IV) metal ions by 1:2 (Metal: ligand) ratio. New ligand and their complexes have been exanimated and Confirmed by Fourier-transform infrared (FT-IR), Ultraviolet-visible (UV-visible), Proton nuclear magnetic resonance (1HNMR), carbon13 nuclear magnetic resonance (13CNMR), carbon-hydrogen nitrogen sulfur (C-H-N-S), thermal analysis (TG), atomic-absorption-flame (AAF), cond-uctivity and Magnetic susceptibility. Examining new compounds through a calculation of photodegradation polystyrene films, assessed photo-stability activities. Results indicate Pt2L3 > Pd2L3 > Cu2L3 > Ni2L3 > Co2L3 > L3 > PS. Polymer stability is given for this the analysis of the reduction of weight, molecular average, reveals a more stable polystyrene PS.
The experimental and theoretical methods were studied for inhibition of the corrosion titanium in HCl by using neomycin sulfate drug. The results of neomycin sulfate drug had good corrosion protection for titanium in hydrochloric acid and the inhibition efficiency (%IE) increasing with increasing concentration of drug because the neomycin sulfate drug had adsorption from acid solution on surface of titanium metal. The program of hyperchem-8.07 was used for theoretical study of the drug by molecular mechanics and semi-empirical calculations. Quantum chemical was studied drug absorption and electron transferred from the drug to the Titanium metal, also inhibition potentials of drug attachment with the (LUMO-HOMO) energy gap,
... Show MoreElectronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreSalmonella enteritidis one of more important as epidemiological bacteria between other salmonella types. It is very important pathologically that cause food poising and gastrointestinal tract infections. This study includes some of immunological changes that appear by ELISA test and antibiotic sensitivity test against these bacteria in mice. ELISA test results appears high immunological response happen after 3 days of inoculation, mean titration readings beginning 0.198 and the maximum mean titration after 15 days of inoculation 1.538 and begin to decrease after this time slowly to remain about 0.297 after 40 days of inoculation. An antibiotics sensitivity test result appears, this bacteria sensitive to Chloramphenicol, Ceftriaxone,
... Show MoreAn experimental and theoretical study has been done to investigate the thermal performance of different types of air solar collectors, In this work air solar collector with a dimensions of (120 cm x90 cm x12 cm) , was tested under climate condition of Baghdad city with a (43° tilt angel) by using the absorber plate (1.45 mm thickness, 115 cm height x 84 cm width), which was manufactured from iron painted with a black matt.
The experimental test deals with five types of absorber:-
Conventional smooth flat plate absorber , Finned absorber , Corrugated absorber plate, Iron wire mesh on absorber And matrix of porous media on absorber .
The hourly and average efficiency of the collectors
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Predicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods
... Show MoreFortieth book is IbnAssaker mechanisms of modern books authored attention appeared amenable to the Messenger of Allah's will (Fife da upon h-d) in his emotional tempting scientists say despite his weakness and preached it save forty Hadith of year necessitated intercession and entering heaven eh Fife FA scientists 1940s h.g. Gae updated combines forty Hadith on a particular topic, authored destinations differed and collected and compiled, the first item in the 1940s that Abdul Rahman Abdullah ibn al-mubaarakmarvzishaikAssaker promised more than thirty workbook in this kind of composition topics varied between consolidation and conversations prove the Almighty Barry qualities, conversations provisions, worship, preaching, and of them only
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More