The synthesized ligand [4-chloro-5-(N-(5,5-dimethyl-3-oxocyclohex-1-en-1-yl)sulfamoyl)-2-((furan-2-ylmethyl)amino)benzoic acid] (H2L1) was identified utilizing Fourier transform infrared spectroscopy (FT-IR), 1 H, 13 C – NMR, (C.H.N), Mass spectra, UVVis methods based on spectroscopy. To detect mixed ligand complexes, analytical and spectroscopic approaches such as micro-analysis, conductance, UV-Visible, magnetic susceptibility, and FT-IR spectra were utilized. Its mixed ligand complexes [M(L1)(Q)Cl2] [ where M= Co(II), Ni(II) , and Cd(II)] and complexes [Pd(L1)(Q)] and [Pt(L1)(Q)Cl2]; [H2L1] =β-enaminone ligand =L1 and Q= 8-Hydroxyquinoline = L2]. The results showed that the complexes were synthesised utilizing the molar ratio M: L1:L2 (1 :1 :1). The formation of six-coordinate octahedral geometry was proposed for metal complexes Co (II), Ni (II), Cd (II), and Pt (IIII), while the Pd (II) complex was square planar. By using the agar well diffusion method, the ligands and complexes were evaluated for antibacterial activity against Staphylococcus aureus, Escherichia coli. The studies demonstrate that the ligand and its complexes have variable activity against the bacterial types, Some of the complexes had an effect on bacteria, while others had less inhibitory action than the ligand. Also, the produced ligand and its metal complexes have been tested for fungi (Candida albicans );the complexes exhibited suppressing activity against fungi compared to the ligand prepared from them
This study aimed to show the relationship between mental health and shyness for university students in Baghdad and Al – Mustansiria university which its subject was (200) students , ( 100) males and ( 100) females , Mental Health scale which is constructed by (Al – Janabi 1991) and developed by (Hassan 2006) was used for this aim ,The scale of shyness was built according to a questioner to the students and according to previous publications and studies .
Multiple regulation analysis step - wise was used for data analysis in order to identify the possibility to find single or couple indications for the independent variable (mental
... Show MoreAbstract: Israel formulated its security theory, which it established on the "pretext of war", meaning converting any Arab action that Israel deems a threat to its security, into a pretext to ignite the fuse of war, considering this a violation of an existing situation, and then it initiates preventive and pre-emptive attacks, then immediately turns into transfer the war to the enemy's land, to achieve a quick solution by (destroying the enemy), occupying its lands, and benefiting of the advantage of working on (internal lines against an enemy) working on external lines, and ending the war quickly, before the major powers intervene to impose a ceasefire
Moment invariants have wide applications in image recognition since they were proposed.
The research deals with the structures of the contemporary travelers' buildings in particular, and which is a functional complex installations where flexibility, technical and stereotypes play an important role as well as the human values These facilities must represent physiological and psychological comfort for travelers. TThose are facilities where architectural form plays a distinguished role in reversing the specialty and identity of the building. Hence the importance of the subject has been in forced, as a result for the need to study these facilities and to determine the impact and affects by the surrounding environment, to the extent of the urban, environmental, urban, social, and psychological levels. The importance of the resea
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More