New Schiff-base ligand and metal complexes with Cr (Ш), Mn (II), Fe (II), Co (II), Ni (II) and Cu (II) ions are reported. Ligand was prepared in two-step reaction. The reaction of 2-hydroxy-5-methylisophthalaldehyde with 3-Amino-1-propanol resulted in the isolation of precursor (3, 3'-((1E, 1'E)-(propane-1, 3-diylbis (azanylylidene)) bis (methanylylidene)) bis (2-hydroxy-5-methylbenzaldehyde)). The reaction of precursor with 4-Aminoantipyrine gave the required ligand;(4, 4'-(((1E, 1'E)-(((1E, 1'E)(propane-1, 3-diylbis (azanylylidene)) bis (methanyl ylidene)) bis (2-hydroxy-5-methyl-3, 1-phenylene)) bis (methanylylidene)) bis (azanyl ylid ene)) bis (1, 5-dimethyl-2-phenyl-1, 2-dihydro-3H-pyrazol-3-one)) H 2 L. The reaction of this ligand with the appropriate metal ions gave metal complexes of the formulae [M 2 (L)(H 2 O) 2 Cl 2]. Cl 2, M= Cr (Ш),[M 2 (L) Cl 2 (H 2 O) 2], M= Mn (II), Fe (II),[M 2 (L)] Cl 2. H 2 O, M= Co (II), Ni (II),[M 2 (L) Cl 2] H 2 O, M= Cu (II). A range of techniques were used to confirm the entity of ligand and their complexes. The formation of ligand and mode of complexation and geometrical structure of complexes were verified using FTIR, electronic spectra, NMR, ESMS, magnetic susceptibility, micro-elemental analysis, metal content, chloride content and conductance. The analytical and spectroscopic data indicated the formation of four and six-coordinate for complexes. Biological evaluation of ligand and complexes against gram-positive bacteria (G+), Bacillus stubtili, Staphylococcus aureus, and gram-negative bacteria (G−), Escherichia coli and Pseudomonas aeruginosa and compared with antibiotic drug (Cefotaxime) and two types of
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper presents seven modified Adomian Decomposition Method (ADM) techniques for efficiently solving initial value problems, especially those involving non-homogeneous and nonlinear differential equations. While the classical ADM is effective for linear homogeneous cases, it has difficulties solving more complex problems. The proposed modifications—from MADM1 to MLADM—include Maclaurin and Taylor expansions, Laplace transforms, and single-step iterations.• These modifications enhance convergence, reduce complexity, and improve accuracy.• Each method offers specific advantages, such as accelerating convergence (MADM2, RADM4), simplifying computation (TSADM5), and achieving higher accuracy (MLADM).• Numerical examples confirm th
... Show Morefashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreNineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.
Rapid development has achieved in treating tumor to stop malignant cell growth and metastasis in the past decade. Numerous researches have emerged to increase potency and efficacy with novel methods for drug delivery. The main objective of this literature review was to illustrate the impact of current new targeting methods to other previous delivering systems to select the most appropriate method in cancer therapy. This review first gave a brief summary of cancer structure and highlighted the main roles of targeting systems. Different types of delivering systems have been addressed in this literature review with focusing on the latest carrier derived from malarial protein. The remarkable advantages and main limitations of the later
... Show MoreThe soil acari fauna of Citrus orchards of Baghdad in Jadiriya area was studied in a total
of forty-eight samples. Twenty-two species were recorded during the present study of which
eight species were first records to Iraq. The ordinal composition of the soil acari fauna was
predominantly Mesostigmata.
This fauna represents diverse trophic groups. The most abundant groups were the
predacious and the Microphytophagus, while the less abundant groups were the predacious/
Microphytophagus, Macrophytophagus, and Panaphytophagus. The most abundant and
frequent species were Rhizoglyphus sp. Tyrophagus putrescentiea (Scrank), Pachylaelaps
longisetis Halbt. and Stratiolaelaps miles Berl.
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.