Some new complexes of 4-(5-(1,5-dimethyl-3-oxo-2-phenyl pyrazolidin-4- ylimino)-3,3-dimethyl cyclohexylideneamino) -1,5- dimethyl-2- phenyl -1H- pyrazol -3(2H) –one (L) with Mn(II), Fe(III), Co(II), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) were prepared. The ligand and its metal complexes were characterized by phisco- chemical spectroscopic techniques. The spectral data were suggested that the (L) as a neutral tetradentate ligand is coordinated with the metal ions through two nitrogen and two oxygen atoms. These studies revealed Octahedral geometries for all metal complexes, except square planar for Pd(II) complex. Moreover, the thermodynamic activation parameters, such as ?E*, ?H, ?S, ?G and K are calculated from the TGA curves using Coats –Redfern method. Hyper Chem -8 program has been used to predict structural geometries for compounds in gas phase. The heat of formation (?Hf) and bin ding energy (?Eb) at 298 °K for the free ligand and its metal complexes were calculated by PM3 method. The synthesized ligands and their metal complexes were screened for their biological activity against bacterial species, two Gram positive bacteria (Bacillus subtilis and Staphylococcus aureus) and two Gram negative bacteria (Escherichia coli and Pseudomonas aeruginosa).
Abstract
This study aimed to survey fungi associated with the product Indomie and Chips being the trades Iargely by a very important segment of society who are the children, beside consumed by adults, but less so, as the survey results to accompany some fungui samples sterile showed proportions presence included various fungi like. Aspergillus flavus, Aspergillus niger, Penicillium Spp., Fusarium graminearum, F.moniliforme, Alternaria alternate and Rhizopus Spp., and other fungi sterile are not diagnosed. The results showed large dominion fungi A. niger by presence sterile samples of both producers, followed by infection in Fusarium Spp., Penicillium Spp., and A. alternata by infection percentage 55, 20 and 17% respectively for the pr
11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from
... Show MorePleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreIn this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c
... Show MoreThis paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreIn the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative char
... Show MoreIndividual cannot live alone due to to his need for others to facilitate His supplies for living, thus social affiliation is considered one of the most important psychological, social needs in individuals life through his willing to affiliate to others whether they were friends ,family, colleague , or even home to reach some degree of psychological stability.
Affiliation is a tool to search for Satiate through living with group from the same type or comply for group or to be compatible with them or even to be adherent and accept what the group agreed about of criterion.
 
... Show More