The synthesis and structural characterization of new dithiocarbamate (DTC) ligand and some of its dinuclear transition metal complexes are described. The free dithiocarbamate ligand was prepared through several synthetic routes, including Schiff-base formation. The reaction of 2-aminopropane with terephthaldehyde leads to the formation of Schiff_base which is reduced by methanolic NaBH4 to the corresponding secondary diamine. Diamine( N,N'_ (1,4 phenylenebis (methylene)) bis(propan-2 amine)) reacts with (CS2) in a basic solution of (KOH) to provide the corresponding bis(dithiocarbamate) free_ligand, which undergoes complexation with the appropriate metal (II) chloride to constitute macrocyclic complexes. Characterization of the ligand and its complexes was achieved by FTIR, UV-Vis, melting points, conductance, magnetic susceptibility, and 1H, 13C NMR spectroscopy. The analytical and spectroscopic data were employed to obtain the suggested geometries around metal centres. These studies revealed the formation of dinuclear macrocyclic complexes of the general formula [M(L)]2 (where M= Mn(II) , Fe(II), Co(II), Ni(II), Cu(II) and Zn(II)), with tetrahedral. geometries for Mn(II) , Fe(II), Co(II) and Zn(II), and square. planar geometry with Ni(II) and Cu(II) complexes.
Two tetradentate ligands type (N2O2) and their complexes with CoII, NiII and ZnII ions were synthesized via two steps; in the first, the precursors W1 and W2 were synthesized from the reaction of 2,6-diamine pyridine or 2,4-diamine tolylene with 2,5-hexanedione respectively in a 2:1 mole ratio. In the second step the ligands [H2L1] and [H2L2] were prepared from the reaction of the two precursor’s with 2-hydroxy-1-naphthaldehyde in 1:2 mole ratio. Metal complexes were synthesized by the reaction of the ligands with equivalent amounts of the metal chloride. The prepared compounds were characterized with the
... Show MoreAzo dye ligand was produced by coupling the diazonium salt of 4aminoantipyrine with 2, 4-dimethylphenol. The structure of 1 azo compound was someone by elemental analyses, HNMR, FT-IR and UV-Vis spectroscopic mechanics. Metal complexes of nickel (II) and copper (II) have been performed and depicted. The formation of complexes has been identified by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectral process as well as, conductivity and magnetic properties quantifications. The nature of the complexes formed were studied succeed the mole ratio and continuous variation methods, Beer's law followed over a concentration 4 4 scope (1×10- - 3×10- M). High molar absorbtivity of the complex solutions were observed. Analytica
... Show MoreThis paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe increase in obesity and the many accompanying diseases is attributed to the increased production and consumption of foods made of non-nutritive sweeteners without regard to the risks of consuming additional calories, and this in turn leads to hormonal imbalance and metabolic disorders and the resulting imbalance and ill health that have spread to all segments of society. During the research, 0.01, 0.02, 0.03, 0.04 and 0.05 % of stevia sweetener was added to the cream instead of the sugar used. Physical and chemical tests were performed for the stevia extract and the microbial content in the cream, as well as the sensory evaluation. It was noted that fortifying the cream with calorie-free stevia sugar led to the production of
... Show MoreLow grade crude palm oil (LGCPO) presents as an attractive option as feedstock for biodiesel production due to its low cost and non-competition with food resources. Typically, LGCPO contains high contents of free fatty acids (FFA), rendering it impossible in direct trans-esterification processes due to the saponification reaction. Esterification is the typical pre-treatment process to reduce the FFA content and to produce fatty acid methyl ester (FAME). The pre-treatment of LGCPO using two different acid catalysts, such as titanium oxysulphate sulphuric acid complex hydrate (TiOSH) and 5-sulfosalicylic acid dihydrate (5-SOCAH) was investigated for the first time in this study. The optimum conditions for the homogenous catalyst (5-SOCAH) wer
... Show More