Schiff base N,N'-Bis-(4-dimethylamino-benzylidene)-benzene-1,4-diamine has been synthesized from 4-dimethylaminobenzenaldehyde and benzene-1,4-diamine. The structure of Schiff base was obtained by (C.H.N.) microanalysis, Mass, 1HNMR, FT-IR and UV-Vis spectral methods and thermal analysis. Metal mixed ligand complexes of some metal(II) salts with Schiff base ligand and anthranilic acid were prepared in the molar ratio (1:2:2), (Metal):(SBL)2:(Anthra)2, (SBL)= Schiff base ligand, (Anthra) =anthranilic acid and Metal= Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II). The thermal behaviour (TGA) of the complexes was studied. The prepared complexes identified by using mass, thermal analysis, FT.IR and UV-Vis spectrum methods, on otherwise flame
... Show MoreComplexes from the ligand (2-hydroxy benzaldine)-4-aminoantipyrine with some transition metal ions V(l?),Cr(lll),Fe(lll) and Co(ll) were prepared in the presence of the co-ligand 1,10-phenanthroline in alcoholic medium. These compounds were characterized by the available techniques: FT-IR ,UV-Visible ,magnetic susceptibility, Flame atomic absorption technique as well as elemental analysis and conductivity mesurments .From these spectral studies, a square pyramidal structure proposed for V(IV) complex and an octahedral geometry for Cr(III),Fe(III) and Co(II) complexes. The biological activity of the ligands and their complexes were evaluated by a gar plate diffusion technique against three human pathogenic bacterial strains: Pseudomonas ae
... Show More3-(4-hydroxyphenyl)-2-(3-(4-nitrobenzoyl) thioureido) propanoic acid (HNP) a new ligand was synthesized by reaction of Tyrosine with (4-Nitrobenzoyl isothiocyanate) by using acetone as a solvent. The prepared ligand (HNP) has been characterized by elemental analysis (CHNS), infrared (FT-IR), electronic spectral (Ultraviolet visible) and(1H,13C-Nuclear Magnetic Resonance) spectra. Some Divalent metal ion complexes of (HNP) were prepared and spectroscopic studies by Fourier transform infrared (FTIR), electronic spectral(UV-Vis), molar conductance, magnetic susceptibility and atomic absorption. The results measured showed the formula of six prepared complexes were [M (HNP)2] (M+2 = Manganese, Cobalt, Nickel, Znic, Cadmium and Mercury),from the
... Show MoreIn this paper ,six new mixed metal ligand complexes are reported with Cephalexin (Ceph.H)as a primary ligand and Dimethylglyoxime (DMG) as secondary ligand with metal Chloride [MCl2 .nH2O. M=Mn(II),Co(II),Cu(II),Ni(II) and Zn(II),n=0-6] ,CrCl3.6H2O.The complexes are of (1:1:1)(Metal:Ligand: Ligand) Stoichiometry.The structures of these complexes are confirmed by using FT-IR and UV- electronic spectroscopies, magnetic moments, melting points, molar conductivity measurements and the metal % analysis revealed that the complexes analyze indicates a four coordinated as (A)=[M(HDMG) (Ceph)] .M=[Ni(II)and Zn(II).Six coordinated as (B) = K2[M(DMG)(CePh)(H2O)]. M= Mn (II),Co(II) and Cu(II) and (C)=[Cr(DMG)(Ceph)]Cl2. Interestingly, the in-vitro anti
... Show MoreFractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity crit
... Show MoreBackground: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.
Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.
Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More