New derivatives of pyromellitamic diacids and pyromellitdiimides have been prepared by the reaction of one mole of pyromellitic dianhydride with two moles of aromatic amines, these derivatives were characterized by elemental analysis, FT-IR and melting point.
This research paper studies the use of an environmentally and not expensive method to degrade Orange G dye (OG) from the aqueous solution, where the extract of ficus leaves has been used to fabricate the green bimetallic iron/copper nanoparticles (G-Fe/Cu-NPs). The fabricated G‑Fe/Cu-NPs were characterized utilizing scanning electron microscopy, BET, atomic force microscopy, energy dispersive spectroscopy, Fourier-transform infrared spectroscopy and zeta potential. The rounded and shaped as like spherical nanoparticles were found for G-Fe/Cu‑NPs with the size ranged 32-59 nm and the surface area was 4.452 m2/g. Then the resultant nanoparticles were utilized as a Fenton-like oxidation catalyst. The degradation efficiency of
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M 2 Ions in general composition ,[M(Leu) 2 (SMX)] Where L leucine (C 6 H 13 NO 2 )symbolized (LeuH) as a primary ligand and Sulfamethoxazole C 10 H 11 N 3 O 3 S) symbolized (SMX)) as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in(v/v) ethanol /water as solvent containing NaOH. The reaction required the following [(metal: 2(Na Leu --): (SMX )] molar ratios with M(II) ions, Were M ( Mn ( II),Co (II),Ni(II),Cu( II),Zn (II),Cd(II)and Hg( The UV Vis and magnetic moment data revealed an octahedral geometry around M(II), The conductivity data show a non electrolytic nature of the complexes . The
... Show MoreThe new media scene reveals that the unprecedented overlap of a number of technical, economic, and political factors has made the new media a very complicated issue; and the focus of specialized and public debates about its impact on traditional means of communication and forms of social media and social relations. Then, the same scene discloses the reality of the relationship between the new and the traditional. These are the axes that will be will be discussed in this study.
KE Sharquie, AA Noaimi, RA Flayih, Am J Clin Res Rev, 2020 - Cited by 4
A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreIntervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More