Azo-Schiff base compounds (L1 and L2) have been synthesized from the reaction of m-hydroxy benzoic acid with 1,5-dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethylimino]-2-phenyl-2,3- dihydro-1H-pyrazol-4-ylamine and with 3-[2-(1H-indol-3-yl)-ethylimino]-1,5-dimethyl-2-phenyl- 2,3-dihydro-1H-pyrazol-4-ylamine. The free ligands and their complexes were characterized based on elemental analysis, determination of metal, molar conductivity, (1H, 13C) NMR, UV–vis, FT-IR, mass spectra and thermal analysis (TGA). The molar conductance data revealed that all the complexes are non-electrolytes. The study of complex formation via molar ratio in DMF solution has been investigated and results were consistent to those found in the solid complexes with a ratio of (M:L) as (1:1). Moreover, the thermodynamic activation parameters, such as DE*, DH*, DS*, DG*and K are calculated from the TGA curves using Coats–Redfern method. Hyper Chem-6 program has been used to predict the structural geometries of compounds in gas phase. The heat of formation (DHf) and binding energy (DEb) at 298 K for the free ligands and their vanadyl complexes were calculated by PM3 method. The synthesized ligands and their metal complexes were screened for their biological activity against bacterial species, two Gram positive bacteria (Bacillus subtilis and Staphylococcus aureus) and two Gram negative bacteria (Escherichia coli and Pseudomonas aeruginosa).
Industrial characteristics calculations concentrated on the physical properties for break down voltage in sf6, cf4 gases and their mixture with different concentrations are presented in our work. Calculations are achieved by using an improved modern code simulated on windows technique. Our results give rise to a compatible agreement with the other experimental published data.
Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar
... Show Moreالمستخلص
يعد تقييم اداء العاملين احد اهم الركائز الاساسية التي يتوقف عليها نجاح أي منظمة تسعى بأن تتطور وتتميز بأنشطتها واداءها وبالأخص المنظمات التي لها خصوصية في عملها كالأجهزة الرقابية التي تعتمد في اداء انشطتها ومسؤولياتها على كفاءة مواردها البشرية, ومن هذا المنطلق يهدف هذا البحث الى تصميم انموذج ثلاثي المحاور (المؤهلات والقدرات، الاداء والانجاز، التعاون والالتزام الوظيفي) ثُماني المستويات
... Show MoreThe main purpose of this paper is to introduce a some concepts in fibrewise totally topological space which are called fibrewise totally mapping, fiberwise totally closed mapping, fibrewise weakly totally closed mapping, fibrewise totlally perfect mapping fibrewise almost totally perfect mapping. Also the concepts as totally adherent point, filter, filter base, totally converges to a subset, totally directed toward a set, totally rigid, totally-H-set, totally Urysohn space, locally totally-QHC totally topological space are introduced and the main concept in this paper is fibrewise totally perfect mapping in totally top
The research investigates the term innovation and its role in elaborating architectural practice based on diffusion. The complexity of the architectural field compared with other fields shows a problem in explaining how innovations in architecture diffuse as a thought and act in a certain context of practice. Therefore, the research aims to build an intellectual model that explains the way personal thoughts resembled by unique models introduced by creative and innovator designers diffuse in a certain pattern elaborate these models into a state of prevailing thought resembled by the movement in architecture. The research will apply its model to the more comprehensive movement in architecture, which is the modern movement,
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show Moreيهدف البحث الى دراسة وتحليل الهندسة المتزامنة (CE) وتحسين التكلفة(CO)، واستعمال مخرجات الهندسة المتزامنة كمدخلات لتحسين التكلفة، وبيان دور الهندسة المتزامنة في تحسين جودة المنتوج، وتحقيق وفورات في وقت التصميم والتصنيع والتجميع وتخفيض التكاليف، فضلاً عن توظيف بعض النماذج لتحديد مقدار الوفورات في الوقت ومنها نموذج(Lexmark) ونموذج (Pert) لتحديد الوفورات في وقت التصميم وقت لتصنيع والتجميع. ولتحقيق اهداف
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the Battery industry for an effluent containing lead ion. The reuse of such effluent can only be made possible by appropriate treatment method such as electro coagulation.
The electrochemical process, which uses a cell comprised aluminum electrode as anode and stainless steel electrode as cathode was applied to simulated wastewater containing lead ion in concentration 30 – 120 mg/l, at different operational conditions such as current density 0.4-1.2 mA/cm2, pH 6 -10 , and time 10 - 180 minute.
The results showed that the best operating conditions for complete lead removal (100%) at maximum concentration 120 mg/l was found to be 1.2 mA/cm2 cur