Mixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5- trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion (𝐶𝑂 ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional theory (DFT) calculations. Also, the recorded and calculated IR spectra of the complexes suggested that the coordination of Schiff base is a bidentate ligand with Cu and Ni complexes and a tridentate ligand with Co, Cr, and Zn complexes. The electronic structures of the complexes were investigated by DFT calculations, showing several degrees of HOMOLUMO energy gaps between complexes. The complexes were studied for their DNA interaction activities. The synthesized ligand and its metal complexes were evaluated for antimicrobial properties against bacterial strains of Bacillus subtilis (G+), Enterobacter cloacae (G-), and Staphylococcus aureus (G+). These complexes considered in this study showed good antimicrobial activity.
Numerical Investigation was done for steady state laminar mixed convection and thermally and hydrodynamic fully developed flow through horizontal rectangular duct including circular core with two cases of time periodic boundary condition, first case on the rectangular wall while keeping core wall constant and other on both the rectangular duct and core walls. The used governing equations are continuity momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C.) methods. The Finite Difference approach with the Line Successive Over Relaxation (LSOR) method is used to obtain all the computational results the (B.F.C.) method is used to generate th
... Show MoreThis research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the
... Show MoreBackground: Recently increasing number of people are using mouthwashes for general and oral care while the primary appeal of a mouthwash is an aid to breath freshness and cleansing the mouth, the majority of mouthwashes also claim to have antiseptic properties. The aim of this study is to determine the antimicrobial effectiveness of eight types of mouthwashes against Streptococcus mutans, Staphylococcus aureus and Candida albicans in vitro. Materials and methods: Agar diffusion technique was used to evaluate the antimicrobial activity of eight types of mouthwashes against Streptococcus mutans, Staphylococcus aureus and Candida albicans isolated from the oral cavities of patients attending dental clinics at college of dentistry - Baghdad Uni
... Show MoreThe image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show MoreDiabetes Mellitus (DM) is a chronic disease distributed worldwide and dominantly related to different types of diseases especially microbial infections, this study aimed to find the relationship between DM mouth microbiome and some demographic factors. Sixty saliva specimens and bacterial oral swabs were collected from randomly selected DM patients, including 29 females and 31 males enrolled in this study, which was obtained from the Al-Mustansiriya University national diabetes center in Baghdad, and other 40 apparently healthy people specimens and swabs were collected from 25 females and 15 males as a control group for the period starting November / 2021 to February / 2022. The results revealed that the most prevalent bacterial gener
... Show MoreVolumetric chemical adsorption was done in a volumetric apparatus using hydrogen gas at room temperature on eleven platinum catalyst, commercial catalysts (RG-412,RG-402 ,RG-432, RG-451, RG-482, and PS-10) and prepared platinum catalysts with 0.1, 0.2 , 0.45 , and 0.55% by weight of Pt supported with Y-alumina. The results show that the metal crystallite area increases with increasing platinum content. The dispersion and particle size of metal crystallite located between 48.2-96.1% and 3.85-12.72 nm, respectively. For bimetallic catalysts, the hydrogen intake decrease in the following order : Re < Sn < Ir.
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More