1-[4-(4-Acetyl-2-hydroxy-phenylazo)-phenyl]-ethanone (L1) and 1-[3-Hydroxy-4(4-nitro-phenylazo)-phenyl]-ethanone (L2) were readied by combination the diazonium salts of amines with 3-hydroxyacetophenone. (C.H.N) analyses, infrared spectra, UV–vis electronic absorption spectra, 1H and 13CNMR spectral mechanisms are use to identified of the ligands. Complexes of Ni+2 and Cu+2 were performed as well depicted. The formation of complexes has been identified by using atomic absorption of flame, elemental analysis, infrared spectra and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied obeyed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4 - 3×10-4 M). height molar absorbtivity of compound solutions have been noticed. Analytical data showed that all the complexes offered 1:2 metal-ligand ratios. At the radix for physicochemical datum a tetrahedral geometry have been described at compounds. Biological activity at these complexes has been assayed. Other than, dyeing carried out of the produced compounds was practical at cotton fabric. Dyes have been examined of light and the stability of detergent.
Abstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
During the educational practices in the Spanish department at the Faculty of Languages , University of Baghdad , we noticed that the personal pronouns in effect replaced by the direct and indirect characterized hardly be expressed , and the difficulty of her education.
Rationale: I chose this topic because the personal pronouns differ between the Spanish language and the Arabic language. We believe that this study may be useful not only for language teachers, but also for students, because it can contribute to a greater awareness of and correct weaknesses.
Objectives: To apply the model from which to address the problems in the use of personal pronouns Spanish , and the difference between effect of direct and indire
... Show MoreThis paper presents the implementation of a complex fractional order proportional integral derivative (CPID) and a real fractional order PID (RPID) controllers. The analysis and design of both controllers were carried out in a previous work done by the author, where the design specifications were classified into easy (case 1) and hard (case 2) design specifications. The main contribution of this paper is combining CRONE approximation and linear phase CRONE approximation to implement the CPID controller. The designed controllers-RPID and CPID-are implemented to control flowing water with low pressure circuit, which is a first order plus dead time system. Simulation results demonstrate that while the implemented RPID controller fails to stabi
... Show MoreStick- slip is the continuous stopping& release of the Bit/BHA due to the irregular down-hole rotation prompted by the existing relationship between the friction torque and the torque applied from the surface to free the bit.
Friction coefficient between BHA and wellbore is the main player of stick slip amount, which can be mitigated by support a good lubricators as additives in drilling mud.
Mathematical (or empirical) solves should be done through adjusting all parameters which supposed to reduce stick- slip as low as possible using different models, one of the main parameters is drilling mud. As per Nanoparticles drilling fluid is a new technology that offers high performance
... Show MoreQuantitative real-time Polymerase Chain Reaction (RT-qPCR) has become a valuable molecular technique in biomedical research. The selection of suitable endogenous reference genes is necessary for normalization of target gene expression in RT-qPCR experiments. The aim of this study was to determine the suitability of each 18S rRNA and ACTB as internal control genes for normalization of RT-qPCR data in some human cell lines transfected with small interfering RNA (siRNA). Four cancer cell lines including MCF-7, T47D, MDA-MB-231 and Hela cells along with HEK293 representing an embryonic cell line were depleted of E2F6 using siRNA specific for E2F6 compared to negative control cells, which were transfected with siRNA not specific for any gene. Us
... Show MoreBackground: Radial neck fractures in children account for 5 to 10% of all elbow fractures in children. They are extra-articular fractures of the radius proximal to the bicipital tuberosity. The physis is typically involved as a Salter-Harris I or II pattern. Alternatively, the fracture sometimes is extraphyseal, through the metaphysis. In children there is considerable potential for remodeling after these fractures. Up to 30° of radial head tilt and up to 3 mm of transverse displacement are acceptable. Many modalities of treatment are available regarding Surgical &Non-Surgical treatments. Objectives: To evaluate the functional outcome after surgical percutaneous joystick reduction therapy of severely angulated radial neck fracture i
... Show MoreCommunication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the