This study is included the preparation of two tetradentate amide-thiol proligands of the general structure [H2Ln], [where; (n = (1–2)]. The ligands [H2L1] and [H2L2] have been prepared from the reaction of the cyclic thioester 2-oxo-1, 4-dithiacyclohexane (compound 1) and 3-chloro-2-oxo-1, 4 dithiacyclohexane (compound 2) with 2-aminomethanepyridine in (1:1) ratio respetively. The reaction was carried out in chloroform at room temperature and under N2 atmosphere. Structural formula of these two ligands have been reported.
Poly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Dental stone casts come into contact with impression materials and becomes susceptible to cross contamination from saliva and blood. This study was done to evaluate the physical and mechanical properties of dental stone type IV after treatments with various disinfecting agents and regimes (methods). Materials and Methods: Type IV dental stone and different types of disinfecting agents were used and divided into seven groups: G1: dental stone without disinfection (control group), G2: dental stone mixed with silver nitrate powder 0.5% , G3: dental stone mixed with silver nitrate powder 1%, G4: dental stone mixed with copper sulfate powder 0.5%, G5: dental stone mixed with copper sulfate powder 1% ,G6: dental stone immersed in prop
... Show MoreIn this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will p
... Show MorePorous silicon (PS) layers were formed on n-type silicon (Si) wafers using Photo- electrochemical Etching technique (PEC) was used to produce porous silicon for n-type with orientation of (111). The effects of current density were investigated at: (10, 20, 30, 40, and50) mA/cm2 with etching time: 10min. X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon. The maximum crystal size of Porous Silicon is (33.9nm) and minimum is (2.6nm) The Atomic force microscopy (AFM) analysis and Field Emission Scanning Electron Microscope (FESEM) were used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of p
... Show MoreAu XIXe siècle, avec l’excès de la passion, le roman français commence à avoir de nouvelles figures. Il tend à être un reflet de la pensée et de la passion. Stendhal et Balzac révèlent ainsi le conflit de l’âme et donnent à leur héros l’impression que tout est permis.
Ces protagonistes doivent, d’une part, subir des fluctuations psychologiques, et d’autre part, ces héros doivent être capables de faire face aux rancunes et aux conflits destructeurs. Les personnages stendhaliens et balzaciens finissent par croire que leur combat ne portera pas ses fruits, parce que toute passion déséquilibrée mènera, soit à la fol
... Show More