The multi-dentate Schiff base ligand (H2L), where H2L=2,2'-(((1,3,5,6)-1-(3-((l1-oxidaneyl)-l5-methyl)-4-hydroxyphenyl)-7-(4-hydroxy-3-methoxyphenyl)hepta-1,6-di ene-3,5-diylidene)bis(azaneylylidene))bis(3-(4-hydroxyphenyl)propanoic acid), has been prepared from curcumin and L- Tyrosine amino acid. The synthesized Schiff base ligand (H2L) and the second ligand 1,10-phenanthroline (phen) are used to prepare the new complexes [Al(L)(phen)]Cl, K[Ag(L)(phen)] and [Pb(L)(phen)]. The synthesized compounds are characterized by magnetic susceptibility measurements, micro elemental analysis (C.H.N), mass spectrometry, molar conductance, FT-infrared, UV-visible, atomic absorption (AA), 13C-NMR, and 1H-NMR spectral studies. The characterization of the
... Show MoreThe aim of this paper is to derive a posteriori error estimates for semilinear parabolic interface problems. More specifically, optimal order a posteriori error analysis in the - norm for semidiscrete semilinear parabolic interface problems is derived by using elliptic reconstruction technique introduced by Makridakis and Nochetto in (2003). A key idea for this technique is the use of error estimators derived for elliptic interface problems to obtain parabolic estimators that are of optimal order in space and time.
This article aims to explore the importance of estimating the a semiparametric regression function ,where we suggest a new estimator beside the other combined estimators and then we make a comparison among them by using simulation technique . Through the simulation results we find that the suggest estimator is the best with the first and second models ,wherealse for the third model we find Burman and Chaudhuri (B&C) is best.
The effect of compound machine on wheat/ AlNoor cultivar was studied based on some technical indicators. were tested under three speeds ( 2.541, 3.433 and 4.091km.hr-1) and three tillage depths (14, 16 and 18cm). The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the 2.541km.hr-1 practical speed was significantly better than other two speed in all studied conditions. Except for the FC, which achieved the best results with the third speed 4.091 km.hr-1. mechanical parameters, plant growth parameters and yield and growth parameters. The 1
The study included examination of three types of different origin and orange juice at the rate of recurring per sample, the results showed that the highest rates of acid (pH) in the A and juice were (4). And salts of calcium is 120 ppm in juice C and 86 ppm of magnesium in the juice B, for heavy metals the highest rate of lead .18 recorded ppm in juice B, 1.32 ppm of copper in juice A, 5 ppm of iron in the juice B, 1.3 ppm of zinc in the juice B, 0.05 ppm of aluminum in each of the sappy B and A, 0.02 ppm of cobalt in the juice B, 0.3 ppm of nickel in the juice B, 170.6 ppm sodium in C juice, but for the acids, organic that the highest rates were 3.2 part Millions of acid in the juice owner a, 260 ppm of the acid in the juice the ascorbi
... Show MoreAdvanced drug delivery systems offer undeniable benefits for drug delivery. In the past three decades, new methods have been proposed to develop a novel carriers for drug delivery. Nowadays, the major goal is to maximize therapeutic benefit while minimizing side effects. Drug delivery technique is clearly shifting from the micro to nanoscale. Nano-drug delivery systems (NDDSs) are the most promising approach utilized to improve the accuracy of drug delivery and the efficacy of drugs.In this narrative review article, we evaluate how delivery challenges associated with commercial marketed products and discuss newer DDS is being carried out to overcome these challenges .Different colloidal carrier systems such as carbon nanotube ,li
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More