New Schiff-base ligand and metal complexes with Cr (Ш), Mn (II), Fe (II), Co (II), Ni (II) and Cu (II) ions are reported. Ligand was prepared in two-step reaction. The reaction of 2-hydroxy-5-methylisophthalaldehyde with 3-Amino-1-propanol resulted in the isolation of precursor (3, 3'-((1E, 1'E)-(propane-1, 3-diylbis (azanylylidene)) bis (methanylylidene)) bis (2-hydroxy-5-methylbenzaldehyde)). The reaction of precursor with 4-Aminoantipyrine gave the required ligand;(4, 4'-(((1E, 1'E)-(((1E, 1'E)(propane-1, 3-diylbis (azanylylidene)) bis (methanyl ylidene)) bis (2-hydroxy-5-methyl-3, 1-phenylene)) bis (methanylylidene)) bis (azanyl ylid ene)) bis (1, 5-dimethyl-2-phenyl-1, 2-dihydro-3H-pyrazol-3-one)) H 2 L. The reaction of this ligand with the appropriate metal ions gave metal complexes of the formulae [M 2 (L)(H 2 O) 2 Cl 2]. Cl 2, M= Cr (Ш),[M 2 (L) Cl 2 (H 2 O) 2], M= Mn (II), Fe (II),[M 2 (L)] Cl 2. H 2 O, M= Co (II), Ni (II),[M 2 (L) Cl 2] H 2 O, M= Cu (II). A range of techniques were used to confirm the entity of ligand and their complexes. The formation of ligand and mode of complexation and geometrical structure of complexes were verified using FTIR, electronic spectra, NMR, ESMS, magnetic susceptibility, micro-elemental analysis, metal content, chloride content and conductance. The analytical and spectroscopic data indicated the formation of four and six-coordinate for complexes. Biological evaluation of ligand and complexes against gram-positive bacteria (G+), Bacillus stubtili, Staphylococcus aureus, and gram-negative bacteria (G−), Escherichia coli and Pseudomonas aeruginosa and compared with antibiotic drug (Cefotaxime) and two types of
The research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.
Background:Image guided transthoracic needle biopsy (TTNB) has great diagnostic value for the definitive characterization of lung lesions and is an established primary procedure to diagnose pulmonary nodules. It is traditionally performed as an outpatient procedure. It is safe, accurate, sensitive, and can obviate surgical procedure.
Objective: to assess the accuracy and safety of CT-guided TTNB in Baghdad Teaching Hospital
Patients & Methods: From December 2009 to September 2011, we conducted a prospective study of 43 consecutive outpatient and inpatient lung biopsies. An informed consent was obtained from the patients. No sedation is required. All biopsies were performed using CT guidance withou
The aim of this study to investigate the sexual harassment, prevention strategies, and the appropriate ways that tackle this phenomena. The current research consisted of four chapter; the first chapter gave a general introduction about the targeted topic followed by the problem of statement, the significance of study, study’s aims, and end with the limitations of study. The second section of chapter one referred to the common concepts of study. Third section addressed the previous studies that related to the current one. Chapter two concerned with the sexual violence against minors. It has four section; first section addressed number of concepts which related to sexual violence. The second section focused on the implications of sexual
... Show MoreMany clinical isolates of proteus spp. (30 isolates of P
mirabilis and 30 isolates of P. vulgaris) from patients with urinary
tract infections (UTIs) were examined for their ability to produce
proteolytic enzymes and their ability to form swarming growth. Most
(90%) of P. mirabilis and 60% of P. vulgaris isolates secreta
proteolytic enzymes. A strong correlation was found between the
ability of a strain to secreted proteases and it's ability to form
swarming growth. Non- swarming isolates invariably appeared to be
non- proteolytic. However, some isolates (12 isolates of P. vagaries)
were non- proteolytic even when they formed swarming growth
There are no single materials which can withstand all the extreme operating conditions in modern technology. Protection of the metals from hostile environments has therefore become a technical and economic necessity.
In this work, for enhancing their wear-resistance, boride layers were deposited on the surface of low carbon steel by a pack cementation method at 850 °C for (2, 4, and 6) h using vacuum furnace. The boronizing process was achieved using different concentration of boron source (20, 25, and 30) % wt. into coating mixture to optimize the best conditions which ensure the higher properties with lower time. The coating was characteristic by X ray diffraction (XRD), and it is confirmed t
... Show MoreThe stanza in the sonnet has been defined as a set of poetic lines followed after proem
and be the same meter as that of proem in complete stanza, but in rhyme scheme different
from that meter. The couplet is defined as set of poetic lines that followed the stanza and be as
the same meter as that of stanza, but with different rhyme scheme. This definition is approved
by all specialized in field of Andalus literature and it was also proven to them that this
construction emptied of indications. This meter has endeavored to prove that that there were a
difference in denotation for meaning between the stanza and couplet. Thus, the sonneteers
have outweighed the sonnet of the blind "Tutaili" to their sonnets as they felt
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More