A new ligand (H4L) and its complexes with ( ZnII, CdII and HgII) were prepared. This ligand was prepared in two steps. In the first step a solution of terephthaldehyde in methanol was reacted under reflux with 1,2-phenylenediamine to give an precursor compound which reacted in the second step with 2,4-dihydroxybenzaldehyde to give the ligand. The complexes were then synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods FT-IR, UV-Vis, 1 HNMR, and atomic absorption, chloride content, HPLC, mole-ratio determination. in addition to conductivity measurement. The data of these measurements suggest a distorted tetrahedral geometry for ZnII, CdII and HgII complexes and that they would be presented as [M2L(H2L)CI2]. The Stability Constant K and Gibbs free energy ∆G were calculated for [Zn2(H2L)Cl2] and [Cd2(H2L)Cl2] complexes by using spectrophotometer method. The obtained values indicate that these complexes are stable in their solution. The biological activity for the following ligand ( H4L ) and complexes [Zn2(H2L)Cl2] and [Cd2(H2L)Cl2] was studied .
The plant occupied the largest area in the biosynthesis of silver nanoparticles, especially the medicinal plants, and it has shown great potential in biotechnology applications. In this study, green synthesis of silver nanoparticles from Moringa oleifera leaves extract and its antifungal and antitumor activities were investigated. The formation of silver nanoparticles was observed after 1 hour of preparation color changing. The ultraviolet and visible spectrum, Fourier transform infrared spectroscopy, X-ray diffraction, scanning electron microscopy, and transmission electron microscopy techniques were used to characterize synthesis particles. Ultraviolet and visible spectroscopy showed a silver surface plasmon resonance band at 434
... Show MoreThe problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
In this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number and Magnetic parameter are discussed under the different values as shown in plots.
The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10
There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show More