In this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectroscopic methods. These studies revealed octahedral geometry about Co(III) complexes in which the co-ligands bound through the amine and the carboxylate groups. Molecular structure for the complexes have been optimised by CS Chem 3D Ultra Molecular Modelling and Analysis Program and supported six coordinate geometry.
Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract
Itraconazole is a triazole antifungal given orally for the treatment of oropharyngeal and vulvovaginal candidiasis, for systemic infections including aspergillosis, candidiasis, and for the prophylaxis of fungal infections in immunocompromised patients.
The study aimed to formulate a practical water-insoluble Itraconazole, with insufficient bioavailability as nanosuspension to increase aqueous solubility and improve its dissolution and oral bioavailability.
Itraconazole nanosuspension was produced by a
... Show MoreThe main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and
Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MoreThis research aims to develop transdermal patches of Ondansetron hydrochloride (OSH) with different types of polymers, ethyl cellulose and, polyvinyl pyrrolidone k30 in a ratio (3:0.5,3:1,3:2,2:1,1:1) with propylene glycol 20%w/w as a plasticizer. Prepared transdermal patches were evaluated for physical properties. The compatibility between the drug and excipients was studied by Differential scanning calorimetry (DSC), where there is no interaction between the drug and polymers. From the statistical study, there is a statistical difference between all the prepared formulations p<0.05. In-vitro Release study of transdermal patches was performed by using a paddle over the disc. The release profile of OSH follow
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreA critical milestone in nano-biotechnology is establishing reliable and ecological friendly methods for fabricating metal oxide NPs. Because of their great biodegradable, electrical, mechanical, and optical qualities, zirconia NPs (ZrO2NPs) attract much interest among all zirconia NPs (ZrO2NPs). Zirconium oxide (ZrO2) has piqued the interest of researchers throughout the world, particularly since the development of methods for the manufacture of nano-sized particles. An extensive study into the creation of nanoparticles utilizing various synthetic techniques and their potential uses has been stimulated by their high luminous efficiency, wide bandgap, and high exciton binding energy. Zirconium dioxide nano
... Show More