The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather which exhibits high light fastness, wash fastness, and rubbing fastness. The interaction of DNA has also been achieved. New metal complexes (Co (II), Ni (II), Cu (II), and Zn (II) azo ligands derived from 4-amino antipyrine and 4-aminoacetophenone are reported. The nature of the compounds has been studied followed by methods of continuous contrast, Beer's law, and molar ratio. Analytical methods and spectra revealed the octahedral geometry of the complexes. The azo dye ligand and its metal (II) complexes possess appreciable microbial activities. Novel heterocyclic compounds and its complexes have been investigated. The relationship between the HOMO-LUMO gap and antibacterial activity was investigated computationally. Improved understanding of binding mechanisms was shown by the comparative molecular docking investigations. This review demonstrated the utilization of the polycrystalline Zn (II) metal complex as a sensitizer in organic dye-sensitized solar cells. Quinolinyl-azo-naphthol (HL) is a selective turn-on chemosensor for Al3+ in the presence of other ions, exhibiting a 750-fold rise in emission at 612 nm following activation at visible light (537 nm). The reported limit of detection (LOD) for the 3σ technique is 0.69 nM. During this review it was proven that the effective production of palladium nanoparticles with guar gum as a stabilizer and their use as a catalyst in reduction processes and azo dye degradation. The investigation describing and assessing thiazolyl azo ligand complexes with specific metal ions has been presented.( Zn (II), Cu (II), Co (II), and Ni (II) ) complexes with azo ligands generated from metoclopramide hydrochloride were examined for their industrial and biological applications in cotton fabric dyeing, as well as for light and cleaner firmness. Additionally, the evaluation of the ligand and their complexes' antimicrobial and antifungal capabilities revealed that the ZnL molecule had the strongest antibacterial activity. The application characteristics of thiophene-derived dispersion dyes complexed with Zn, Cu, and Co metal on (polyester and Nylon 6.6), showed good to excellent light fastness, good to excellent wash fastness, excellent fastness to perspiration and sublimation, and good levelness on both materials with varying shades of brown and violet. The azo benzoic acid ligand derived from 2,4-dimethylphenol and 4-aminobenzoic acid has been identified by several spectroscopic methods and has been used as dispersion dyes on cotton textiles to test the antibacterial properties of the chemicals generated against a range of bacteria and fungus. Each primed complex has been proposed to have a tetrahedral geometrical structure for the obtained datum. There have been reports on the use of azo dyes in combination with nickel and its uses in dye-sensitized solar cells. Ten complexes of metals including Zn (II), Cu (II), Cd (II), Ni (II), and Co (II) as well as Phloroglucinol and antipyrine were used to create two unique azo-colorants, which were isolated and examined using a variety of techniques, wool, polyamide, and poly acetate fibers exhibit coloristic activity toward H3L1 and H3L2 as well as their metal complexes, demonstrating their strong resistance to UV radiation. Both in static and dynamic settings, the H3L2 compound exhibited a good sorption activity towards heavy metal cations from aqueous solutions of trace concentrations. A particular combination of selected transition metal ions is complexed with the azo compound, which is obtained from the (2-hydroxy quinoline: synthesis, characterization, thermal analysis, and antioxidant activity). These compounds' reactive oxygen entity degradation was evaluated with the DPPH radical and subsequently compared to gallic acid, a standard naturally occurring antioxidant. Finally, this review explains the metal chelates of the azo dye derivative sulfafurazole through synthesis, structure confirmation, molecular docking simulation, antibacterial, anticancer, and application in bioinorganic chemistry.
Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro
... Show MoreSeveral specimens of the avocet, Recurvirostra avocetta L. are found infected with
Himantocestus gigantivcus sp. nov. ( Cestoda , Diploposthidae) . This cestode is related to H.
blanksoni Ukoli 1965 but easily differentiated from it in having longer and wider strobila,
larger size of testes but lesser in number, cirrus situated in the middle of mature segment
histead of anterior third and slightly posterior to the middle in gravid segment instead of the
middle , ovary and vitelline gland are larger , and the uterus has more branches.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreAn experimental investigation has been made to study the influence of using v-corrugated aluminum fin on heat transfer coefficient and heat dissipation in a heat sink. The geometry of fin is changed to investigate their performance. 27 circular perforations with 1 cm diameter were made. The holes designed into two ways, inline arrangement and staggered in the corrugated edges arrangement. The experiments were done in enclosure space under natural convection. Three different voltages supplied to the heat sink to study their effects on the fins performance. All the studied cases are compared with v-corrugated smooth solid fin. Each experiment was repeated two times to reduce the error and the data recorded after reaching t
... Show MoreThis study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show More