For extraction chloro anion complexes of Cd2+ and Hg2+ used many organic agents as extractant according to liquid ion exchange method such as α-Naphthyl amine (α-NA), 4-Amino benzoic acid (4-ABA), 2-[(4-Carboxy methyl phenyl) azo]-4,5-diphenyl imidazole (4CMePADPI) and Cryptand (C222). This study includes definition hydrochloric acid concentration in aqueous phase and shaking with organic phase necessary for extraction as well as shaking time, organic solvent effect, interferences and alkaline salt effect. Thermodynamic showed the ion exchange reaction was exothermic for α-NA, C222 and endothermic for 4-ABA, 4-CMePADPI for extraction CdCl4=, but for extraction HgCl4= was exothermic with 4-ABA, 4CMePADPI and C222 but endothermic with α-NA. In addition stoichiometry showed the ion pair complex extracted was 1:1:1 Cation: Ligand: Anion
Research objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
The research plan: The research was divided into three topics and a conclusion.
As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second re
: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
A new, Simple, sensitive and accurate spectrophotometric methods have been developed for the determination of sulfanilamide (SNA) drug in pure and in synthetic sample. This method based on the reaction of sulfanilamide (SNA) with 1,2-napthoquinone-4-sulphonic acid (NQS) to form N-alkylamono naphthoquinone by replacement of the sulphonate group of the naphthoquinone sulphonic acid by an amino group. The colored chromogen shows absorption maximum at 455 nm. The optimum conditions of condensation reaction forms were investigated by: (1) univariable method, by optimizing the effect of experimental variables; (different bases, reagent concentration, borax concentration and reaction time), (2) central composite design (CCD) including
... Show MoreZnS:Ce3+ nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS:Ce3+ quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source, cerium chloride as cerium source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS:Ce3+ with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM) also by field effect scanning electron microscopy (FESEM) and XRD. Upon exposure to 460 nm light at zero bias voltage, ZnS:Ce3+/p-Si showed a high sensitivity of 4000% an
... Show MoreMagnetic nanoparticles (MNPs) of iron oxide (Fe3O4) represent the most promising materials in many applications. MNPs have been synthesized by co-precipitation of ferric and ferrous ions in alkaline solution. Two methods of synthesis were conducted with different parameters, such as temperature (25 and 80 ̊C), adding a base to the reactants and the opposite process, and using nitrogen as an inert gas. The product of the first method (MNPs-1) and the second method (MNPs-2) were characterized by x-ray diffractometer (XRD), Zeta Potential, atomic force microscope (AFM) and scanning electron microscope (SEM). AFM results showed convergent particle size of (MNPs-1) and (MNPs-2) with (86.01) and (74.14)
... Show MoreLiquid-crystalline organic semiconductors exhibit unique properties that make them highly interesting for organic optoelectronic applications. Their optical and electrical anisotropies and the possibility to control the alignment of the liquid-crystalline semiconductor allow not only to optimize charge carrier transport, but to tune the optical property of organic thin-film devices as well. In this study, the molecular orientation in a liquid-crystalline semiconductor film is tuned by a novel blading process as well as by different annealing protocols. The altered alignment is verified by cross-polarized optical microscopy and spectroscopic ellipsometry. It is shown that a change in alignment of the
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More