The new polydentate Schiff-base oxime (1E,1`E)-2hydroxy-3-((E)-(2-((E)-2hydrxy3-((E)-(hydroxyimino)methyl)-5-methylbenzyldeneamino)ethylimino)methyl)-5methylbenzaldehyde oxime H4L and its binuclear metal complexes with Mn(II), Fe(II), Co(II) and Cu(II) are reported. The reaction of 2,6 diformyl–4–methyl phenol with hydroxyl amine hydrochloride in mole ratios of 1:1 gave the precursor (E)-2-hydroxy-3((hydroxyimino)methyl)-5-methylbenzaldehyde. Condensation reaction of precursor with ethylenediamine in mole ratios of 2:1 gave the new N4O2 Schiff-base oxime ligand H4L. Upon complex formation, the ligand behaves as a tribasic hexadantate species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectroscopic methods. These studies revealed tetrahedral geometries for Mn(II), Fe(II), Co(II) complexes and square planar geometry about Cu(II) complex of general formulae [M2(HL)](Cl)(H2O). Molecular structure of the for Mn(II), Fe(II), Co(II) complexes has been optimised by CS Chem 3D Ultra Molecular Modeling and Analysis Program and supported four coordinate geometry.
Background: Fruits and their by-products are the primary sources of bioactive chemicals in plants. Because of its phytochemical richness, Annona squamosa fruits have gained the alertness of people willing in health-promoting diets. The purpose of this in vitro study was to evaluate the cytocompatibility effect of ethanolic crude extract of Annona squamosa pulp against a human normal cell line as a mouthwash for children. Material and method: The ethanolic extract of Annona squamosa pulp was extracted using the ultrasonic method and then lyophilized to make it powder. The MTT (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl-2H-tetrazolium bromide) test was performed to investigate the cytotoxic activity of the pulp extract on a human normal cell l
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreA new compound 2-(4-methoxyphcnyl)-5-(4-aminophenyl)-1,3,4-
oxadiazole (VI) was prepared by intramol ecular condensation reaction followed by elimination of some simple moieties such as IhO and HCI by using POCI3 with acid hydrazide. A series of new ShiffsÂ
bases 2-(4-methoxyphenyl)-5-[4(4:alkoxybenzoyloxy) benzylidene amino phenyl] I,3,4-oxadia:t.ole (VII].was synthesized from treatment
of oxadiazole derivative [VI] with an appropriate aromatic aldehyde
(IU). Struct\lfe of the resulting products have been ascertaim:d by their melting pointS, elemental analysis ( some of them) and spectral data.
Virtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show Moreالانهار اصبحت مشبعة بثاني اوكسيد الكربون بشكل عالي وبذلك فهي تلعب دور مهم في كميات الكربون العالمية. لزيادة فهمنا حول مصادر الكربون المتوفرة في النظم البيئية النهرية، تم اجراء هذه الدراسة حول تأثير الكربون العضوي المذاب والحرارة (العوامل الرئيسية لتغير المناخ) كمحركات رئيسية لوفرة ثاني اوكسيد الكربون في الانهار. تم جمع العينات من خمسة واربعون موقع في ثلاثة اجزاء رئيسية لنهر دجلة داخل مدينة بغداد خلال فص
... Show MoreIn this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreThis research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs