New Schiff-base ligand and metal complexes with Cr (Ш), Mn (II), Fe (II), Co (II), Ni (II) and Cu (II) ions are reported. Ligand was prepared in two-step reaction. The reaction of 2-hydroxy-5-methylisophthalaldehyde with 3-Amino-1-propanol resulted in the isolation of precursor (3, 3'-((1E, 1'E)-(propane-1, 3-diylbis (azanylylidene)) bis (methanylylidene)) bis (2-hydroxy-5-methylbenzaldehyde)). The reaction of precursor with 4-Aminoantipyrine gave the required ligand;(4, 4'-(((1E, 1'E)-(((1E, 1'E)(propane-1, 3-diylbis (azanylylidene)) bis (methanyl ylidene)) bis (2-hydroxy-5-methyl-3, 1-phenylene)) bis (methanylylidene)) bis (azanyl ylid ene)) bis (1, 5-dimethyl-2-phenyl-1, 2-dihydro-3H-pyrazol-3-one)) H 2 L. The reaction of this ligand with the appropriate metal ions gave metal complexes of the formulae [M 2 (L)(H 2 O) 2 Cl 2]. Cl 2, M= Cr (Ш),[M 2 (L) Cl 2 (H 2 O) 2], M= Mn (II), Fe (II),[M 2 (L)] Cl 2. H 2 O, M= Co (II), Ni (II),[M 2 (L) Cl 2] H 2 O, M= Cu (II). A range of techniques were used to confirm the entity of ligand and their complexes. The formation of ligand and mode of complexation and geometrical structure of complexes were verified using FTIR, electronic spectra, NMR, ESMS, magnetic susceptibility, micro-elemental analysis, metal content, chloride content and conductance. The analytical and spectroscopic data indicated the formation of four and six-coordinate for complexes. Biological evaluation of ligand and complexes against gram-positive bacteria (G+), Bacillus stubtili, Staphylococcus aureus, and gram-negative bacteria (G−), Escherichia coli and Pseudomonas aeruginosa and compared with antibiotic drug (Cefotaxime) and two types of
Like the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show More
Child's personality development in Islam, in fact, represents the building of the Islamic community and a step on the way for the establishment of life, state, law, and civilization in accordance with the blessed Islamic principles, in order to achieve the happiness of the human being and to protect the components of society and preserve human safety. Child is the issue of interest across many years. Paying heed to childhood issues is not a recent one. The faith of these communities in the child's rights and his education, which makes a man who cherishes himself and his language and homeland.
The success of Islamic goals, the happiness of the individual and the
... Show MoreThe study aims at showing the role of tax audit in Impact the quality of tax statements. Tax audit is one of the most important means used by tax management to identify taxable revenues in a just, fair manner. The quality of statements relies on the extent to which the information provided by taxpayers is true and accurate. Tax audit works is compatible with the strategy of increasing tax adherence and detecting non-adherence cases and penalizing those who commit such violations. The study reached a number of results and conclusions. One of the most important results is that tax audit helps improve the information content of the taxpayers tax statements. This leads to recalculating taxable incomes and re-fixing t
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform
The sound legal thinking that reaches sound legal results is the basis of the legal faculty that is defined as: the faculty of the legal person to understand the legal language verbally and meaningfully and coexist in it and deal with it and realize and choose what words it can from it when needed during work and professional dealing, but this thinking does not have a methodology in specific and specific jurisprudence, as the faculty does not have a fixed size or a certain limit, but is flexible and expands It grows as its owner fills it with legal information and practical experience. The legal faculty has not been regulated by the legislator, in addition to the fact that the judiciary and jurisprudence have not dealt with this by expre
... Show MoreLet be a commutative ring with identity. The aim of this paper is introduce the notion of a pseudo primary-2-absorbing submodule as generalization of 2-absorbing submodule and a pseudo-2-absorbing submodules. A proper submodule of an -module is called pseudo primary-2-absorbing if whenever , for , , implies that either or or . Many basic properties, examples and characterizations of these concepts are given. Furthermore, characterizations of pseudo primary-2-absorbing submodules in some classes of modules are introduced. Moreover, the behavior of a pseudo primary-2-absorbing submodul
... Show MoreConsider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs derived from the group and a few classes of zero-divisor graphs of the commutative ring R are examined.
The research aims to identify the reasons that lead to asymmetry of information between economic unity administration and the parties that use accounting information such as shareholders, So, the ability to reach to the solutions that would reduce this problem, these factors have been divided into two types: the first one is the internal factors which represent the administration's desire in order to expand the self-interest of getting the profits and increase the value and competitive entity and investors to obtaining greater returns for their shares, so the second type is the external factors, which represent the failer that occurs in the laws and regula
... Show MoreFelodipine is a calcium-channel blocker with low aqueous solubility and bioavailability. Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE) is one of the popular methods that has been used to solve the dispersibility problems of many drugs. Felodipine was formulated as a NE utilizing oleic acid as an oil phase, tween 80 and tween 60 as surfactants and ethanol as a co-surfactant. Eight formulas were prepared, and different tests were performed to ensure the stability of the NEs, such as particle size, polydispersity index, zeta potential, dilution test, drug content, viscosity and in-vitro drug release. Result
... Show More