A novel Schiff base ligand (DBC) synthesized from 4-chlorobenzoic acid, along with its Cu (II) and Co (II) complexes, was prepared and characterized using FT-IR, 1H and 13C-NMR, UV-Vis spectroscopy, as well as magnetic and conductivity measurements. Based on this, a tetrahedral structure of [M(DBC)Cl2] was proposed for the complexes. Antioxidant activity of the compounds was assessed and compared to ascorbic acid, revealing that the copper complex exhibited superior antioxidant properties compared to the cobalt complex and the ligand. Furthermore, the antibiofilm potential of the copper and cobalt complexes was assessed against five clinically relevant bacterial species (P.aeruginosa, E.coli, K.pneumoniae, S.aureus and S.typhi) usin
... Show Moreتم تحضير ثلاث معقدات جديدة Ni (II)و Cu (II) و Zn (II) باستخدام الليكند المحضر الجديد من تفاعل حامض مالونيك ثنائي هيدرازايد مع 2-بيريدين كربوكسالديهايد. حيث شخصت المعقدات لمحضرة وكذلك الليكند باستخدام تقنيات مختلفة مثل FT-IR و UV-Vis و Mass و 1H-NMR و 13C-NMR وتحليل العناصر CHN و تقدير محتوى الكلور والموصلية المولارية والحساسية المغناطيسية والامتصاص الذري لتشخيص هذه المركبات. لكل معقد محضر جديد من النيكل والنحاس والزنك ، كشفت نتائج ا
... Show MoreThe synthesis of ligands with N2S2 donor sets that include imine, an amide, thioether, thiolate moieties and their metal complexes were achieved. The new Schiff-base ligands; N-(2-((2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio)-acetamide (H2L1) and N-(2-((2,4-di-p-tolyl-3-azabicyclo[3.3.1]nonan-9-ylidene)amino)ethyl)-2-((2-mercaptoethyl)thio) acetamide (H2L2) were obtained from the reaction of amine precursors with 1,4-dithian-2-one in the presence of triethylamine as a base in the CHCl3 medium. Complexes of the general formula K2<
يهدف هذا البحث الى التطرق الى صورة العربي كما يعرضها ادب اليافعين العبري في رواية " نادية " للكاتبة العبرية " كاليلا رون فيدر " . والتي تعد من الاديبات العبريات اللواتي تطرقن بصورة مباشرة الى موضوع ما خلف الجدار ، والصراع العربي – الإسرائيلي وانعكاساته على المجتمع الإسرائيلي بصورة عامة والمجتمع العربي بصورة خاصة . ينقسم هذا البحث إلى ثلاثة فصول، تطرق الفصل الأول إلى "ادب اليافعين"، و تاريخه ، مميزاته والفئ
... Show MoreThe survey showed sample opinions of officials in the general company for vegetable oils industry, and the statement of the order of the effect of these dimensions depending on the degree of importance, the questionnaire was used as a key tool in collecting data and information of the sample consisted of 30 officials, arithmetic mean, standard deviation, percentages, Spearman correlation coefficient and the global statistical analysis as a statistical methods that based on statistical program (SPSS), The researcher came to several conclusions, most important that there is high agreement by the respondents of the importance of the dimensions of building a mental picture of the company and to attract the consumer's attention, Also research
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreMedia studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
Apple slice grading is useful in post-harvest operations for sorting, grading, packaging, labeling, processing, storage, transportation, and meeting market demand and consumer preferences. Proper grading of apple slices can help ensure the quality, safety, and marketability of the final products, contributing to the post-harvest operations of the overall success of the apple industry. The article aims to create a convolutional neural network (CNN) model to classify images of apple slices after immersing them in atmospheric plasma at two different pressures (1 and 5 atm) and two different immersion times (3 and again 6 min) once and in filtered water based on the hardness of the slices usin