A new Schiff base (4-chlorophenyl)(phenyl methanimine (6R,7R)-3-methyl-8-oxo-7-(2-phenylpropanamido)-5-thia-1-azabicyclo[4.2.0]oct-2-ene-2-carboxylate=HL=C29H24ClN3O4S) has been synthesized from β-lactam antibiotic (cephalexin mono hydrate (CephH)=(C16H19N3O5S.H2O) and 4- chlorobenzophenone. Metal mixed ligand complexes of the Schiff base were prepared from chloride salt of Fe(II), Co(II), Ni(II), Cu(II), Zn(II) and Cd(II), in 50% (v/v) ethanol – water medium in aqueous ethanol(1:1) and Saccharin(C7H5NO3S) containing sodium hydroxide. Several physical tools in particular; IR, C:H:N , 1H NMR,13C NMR for ligand, melting point, molar conductance, magnetic moment. and determination of the percentage of the metal in the complexes by flame(AAS). The ligand and their metal complexes were screened for their antimicrobial activity against four bacteria (gram +ve) and (gram -ve) [Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Bacillus]. The proposed structure of the complexes using the program, Chem office 3D (2006) and the general formula have been given for the prepared mixed ligand complexes [M(Sac)3(L)].
يهدف البحث الحالي الى استكشاف علاقات التفاعل والتاثير بين الاحتكام للمكانة والتوجه للفردية– الجماعية والدمج التنظيمي مستنداً على مزج اختلاف القيم الشخصية مع افكار نظرية الهوية الاجتماعية لبلورة نموذج البحث. وفي ضوء هذا تم صياغة عدد من الفرضيات التي توضح علاقات التفاعل ما بين ابعاد الاحتكام للمكانة والتوجه للفردية– الجماعية للتنبؤ بوجود الدمج التنظيمي. جمعت البيانات باستخدام استمارة الاستبيان ووزع
... Show MoreMultimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreThis study focuses on CFD analysis in the field of the shell and double concentric tube heat exchanger. A commercial CFD package was used to resolve the flow and temperature fields inside the shell and tubes of the heat exchanger used. Simulations by CFD are performed for the single shell and double concentric tube.
This heat exchanger included 16 tubes and 20 baffles. The shell had a length of 1.18 m and its diameter was 220 mm. Solid Works 2014, ANSYS 15.0 software was used to analyze the fields of flow and temperature inside the shell and the tubes. The RNG k-ε model was used and it provided good results. Coarse and fine meshes were investigated, showing that aspect ratio has no significant effect. 14 million
... Show MoreThe use of external posttensioning technique for strengthening reinforced concrete girders has been considerably studied by many researchers worldwide. However, no available data are seen regarding strengthening full-scale composite prestressed concrete girders with external posttensioned technique under static and repeated loading. In this research, four full-scale composite prestressed I-shape girders of 16 m span were fabricated and tested under static and repeated loading up to failure. Accordingly, two girders were externally strengthened with posttensioned strands, while the other two girders were left without strengthening. The experimental tests include deflection, cracking load, ultimate strength and strains at midspan, a
... Show MoreThe process for preparing activated carbon (AC) made from tea residue was described in this paper. Investigated were the physicochemical characteristics and adsorption efficiency of the produced AC. Activation with potassium hydroxide (KOH) and carbonization at 350 °C are the two key steps in the manufacturing of AC. The activated carbon was used to adsorb Tetracycline (TC). Different parameters were studied at room temperature to show their effects on the adsorption efficiency of TC. These parameters are the initial concentration of adsorbate TC, solution acidity pH, time of adsorption, and adsorbent dosage. The prepared active carbon was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microscopy (
... Show More
Concentrated research topic in addressing variable vital to the work of offices of inspectors general, construction and scale effectiveness and efficiency is the organizational structure, which are important as is obvious to any researcher in the management and organization and this variable would affect the exercise task supervision and inspection of financial and administrative corruption and combat efficiently, Thus this effect will be placed in the fold ability to achieve goals. That the creation of the organizational structure and requirements to achieve harmony between its properties is creating step towards success. This research aims to analyze the characteristics and style o
في البحث الحالي تم تحضير ودراسة النشاط الحيوي لسلسلة من البوليمرات الجديدة المحورة من الكيتوسان مع مركبات تحتوي على مجموعة الآزو. في البداية تم تحضير ملح الديازونيوم من تفاعل 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine مع حامض الهيدروكلوريك المركز ونتريت الصوديوم .ثم تفاعل الازدواج بين ملح الديازونيوم مع الديهايدات اروماتية معوضة لإنتاج مشتقات الازو (1-6). ازو شف بيس كيتوسان((12-7 والتي حضرت من تفاعل الكيتوسان مع مشتقات
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show More
The main aim of this study is to evaluate the remaining oil in previously produced zones, locate the water productive zone and look for any bypassed oil behind casing in not previously perforated intervals. Initial water saturation was calculated from digitized open hole logs using a cut-off value of 10% for irreducible water saturation. The integrated analysis of the thermal capture cross section, Sigma and Carbon/oxygen ratio was conducted and summarized under well shut-in and flowing conditions. The logging pass zone run through sandstone Zubair formation at north Rumaila oil field. The zones where both the Sigma and the C/O analysis show high remaining oil saturation simila
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show More