Using sodium4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate (SDPIHN) as a chromogenic reagent in presence of non-ionic surfactant (Triton x-100) to estimate the chromium(III) ion if the wavelength of this reagent 463 nm to form a dark greenish-brown complex in wavelength 586 nm at pH=10,the complex was stable for longer than 24 hours. Beer's low, molar absorptivity 0.244×104L.mol-1.cm-1, and Sandal's sensitivity 0.021 µg/cm2 are all observed in the concentration range 1-11 µg/mL. The limits of detection (LOD) and limit of quantification (LOQ), respectively, were 0.117 µg/mL and 0.385µg/mL. (mole ratio technique, job's method) were employed to investigate the stoichiometry of complexes, and both methods revealed that the metal to reagent ratio is equal 1:3.The absorption impact value of the reagent concentration, surfactant concentration, pH, reaction duration, temperature, addition sequences, ionic strength, masking agent, and the influence of many parameters such as affect cations and anions, among others. The influence of temperature on the reaction, which was referred to as an exothermic reaction, was also taken into account while calculating thermodynamic functions. Researchers investigated some of the complex solid's physical properties, such as solubility, molar conductivity, and melting point, as part of its development. UV-visible rays were used to investigate the chromium complex, while Relative Standard Deviation (RSD%) and Relative Error (E %) were used to assess the precision and accuracy of the novel method.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThis study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show MoreThe lipid profile and adipokines of an adolescent may be affected by some parasite infections. Recently, it has been discovered that these parasites are connected to body mass index (BMI), lipids and adipokines. The current study, therefore, aimed to specify how Toxoplasma gondii (T. gondii) affect BMI, lipid profile and adipokines. This study was conducted in Al Madain hospital, Baghdad from October to December 2022. An ELISA test was performed to examine the anti-T. gondii IgG and IgM for a group of adolescents attending the hospital. Based on this examination ninety adolescents were chosen to be involved in the study. They were separated in to two groups: individuals who tested positive for the parasite (n=45) and those who teste
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreNumerical simulations are carried out to evaluate the coherence concept’s effect on the performance regarding the optical system, when observing and imaging the planet’s surface. In numerous optical approaches, the coherence qualities of light sources play an important role. This paper provides an overview about the mathematical formulation of temporal and spatial coherence and incoherence properties of light sources. The circular aperture was used to describe the optical system like a telescope. The simulation results show that diffraction-limited for incoherent imaging system certainly improves the image. Yet, the quality of the image is degraded by the light source's highly spatial and temporal coherence properties, resulting in a
... Show MoreI attended the new chief base of bilateral interaction Para Amino like 1 Phenyl 4 Bayrosolin 5 Online with Alsalesl Aldehid someone Allicand by careful analysis of the elements and infrared spectrum
The recent research aims to the following
1- Identify the for Psychicasthein high school students
2-Identify the differences of Psychicasthein of high school students according tothe (male, female).
3- Identify the for Family Violence high school students .
4-Identify the differences of Family Violence of high school students according to the ( male,female)
5-Identify of the relationship between the Psychicasthein and family violence
To achieve the objectives of the present research was to build Psychicasthein scale and the adoption of a measure of domestic violence, and applied these tools, and after extracting the psychometric properties of the two measures of reliability and validity, according to a sample of 200 stu