Four metal complexes mixed ligand of 2-aminophenol (2-AP) and tributylphosphine (PBu3) were produced in aqueous ethanol with (1:2:2) (M:2-AP:PBu3). The prepared complexes were identified by using flame atomic absorption, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. In addition antibacterial activity of the two ligands and mixed ligand complexes oboist three species of bacteria were also examined. The ligands and their complexes show good bacterial activities. From the obtained data the octahedral geometry was suggested for all prepared complexes.
In the present work, the phthalic acid (phthH2) and 1.10 phenonthroline (phen), and their complexes were synthesized and isolated as [M(phth)(phen)2], Mn(II), Fe(II), Co(II), Ni(II) Cu(II), Zn(II), and Cd(II) ions. These complexes were characterized by elemental analysis, melting point, conductivity, percentage metal, UV–Vis, FT-IR, and magnetic moment measurements. The molar conductance indicates that all the metal complexes in DMSO are nonelectrolytic. phthalic acid (phtha), and 1,10-Phenanthroline (phen), behaved as bidentate, coordinating to the metal ion through their two oxygen and two pyridinyl nitrogen atoms respectively, as corroborated by. Electronic spectra, FTIR, spectroscopy amusement indicated that all the metal complexes ad
... Show MoreIn the present article, mixed ligand metal (II) complexes have been synthesized with Schiff base (1E, 5Z, 6E)-1,7 bis (4-hydroxy-3- methoxyphenyl)-5-(3-hydroxyphenyl) imino) hepta-1,6-dien-3-one derived from Curcumin and 3-aminophenol as primary ligand and L-dopa as a secondary ligand. The Schiff base act as bidentate and arrange to the metals through the azomethine (C=N) nitrogen and (C=O) oxygen atom. The mode of bonding of the Schiff base has been affirmed on the infrared by the UV-Visible, 1H, and 13C NMR spectroscopic techniques. The magnetic susceptibility and the UV-Vis data of the complexes propose octahedral geometry around the central metal ion. The information appears that the complexes have the structure of [L-M-(L-dopa)] system
... Show MoreIn this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
This research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreThe novels that we have addressed in the research, Including those with the ideological and political ideology, It's carry a negative image for the Kurds without any attempt to understand, empathy and the separation between politics and the people, The novels were deformation of the image, Like tongue of the former authority which speaks their ideas, Such as (Freedom heads bagged, Happy sorrows Tuesdays for Jassim Alrassif, and Under the dogs skies for Salah Salah). The rest of novels (Life is a moment for Salam Ibrahim, The country night for Jassim Halawi, The rib for Hameed Aleqabi). These are novels contained a scene carries a negative image among many other social images, some positive, and can be described as neutral novels. We can
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More