In this study, a new Azo ligand 5-((2-(1H-indol-2-yl)ethyl)diazinyl)-2-aminophenol is synthesized from a reaction of Tryptamine with 2-aminophenol. The ligand and their metal ion complexes Ni(II), Pd(II) , Pt(IV) and Au(III) have been synthesized and characterized by various analytical techniques, including elemental microanalysis, metal content, chloride-containing, measurement of electrical conductivity, magnetic susceptibility, 1H and 13C-NMR, FT-IR, UV-Vis, mass spectra (MS), and thermal analysis (TGA and DSC) curves. The DCS curve was used to calculate the thermodynamic parameters ΔH, ΔS, and ΔG. The characterization results promote the metal complexes of azo ligand structures. The results indicate that the
... Show MoreThe purpose of this paper is to identifying some of the physical, kinetic and electrical capabilities of the working muscles of patients with simple hemiplegic cerebral palsy, preparation of special exercises (rehabilitation and water) accompanied by symmetrical electrical stimulation in the rehabilitation of working muscles for patients with simple hemiplegic cerebral palsy, and identifying the effect of exercises, especially (rehabilitation and water), accompanied by symmetrical electrical stimulation, on some physical, kinetic and electrical capabilities in rehabilitating working muscles for patients with simple hemiplegic cerebral palsy. The researcher used the experimental approach with a one-group design with two pre and post-tests du
... Show MoreATTAPULGITE clay was modified in this study by the graphene oxide sheets and the clay was diagnosed before and after modification using several techniques (Fourier-transform infrared spectroscopy FT-IR, X-ray powder diffraction XRD, Scanning electron microscope SEM , energy dispersive spectroscopy EDX ) ,The surface of the attapulgite clay (before (Ata) after modification by graphene oxide (Ata-GO) ) was applied to adsorption of the Alizarin dye from its water solutions through the application of several kinetic models (pseudo first-order model , pseudo second -order model , intraparticle diffusion model ),It was found that the practical results follow pseudo second -order model. The process of modification on the surface of the mud has imp
... Show MoreMechanism of Arbitration in the Stock Exchange Disputes
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThe term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .
Calculations of sputtering yield for Lithium,Sodium and Krypton bombarded by the same own ions are achieved by using TRIM program.The relation of angular dependent of sputtering yield for each ion/target is studied. Also, the dependence of the sputtering yield of target on the energy of the same ion is discussed and plotted graphically. Many researchers applied polynomials function to fit the sputtering data from experimental and simulation programs, however, we suggest to use Ior function for fitting the angular distribution of the sputtering yield. A New data for fitting coefficients of the used ion/target are presented by applying used function for the dependence of the sputtering yield on the ion energy.