New bidentate dithiocarbamate ligand (NaL) namely [Sodium-2-(((3-methyl -4- “(2,2,2-tri fluoro ethoxy) pyridin-2”-yl) methyl) sulfinyl)-1H-benzoimidazole -1-carbodithioate] was prepared. This free ligand was synthesized from the reaction of a (RS)-2-([3-methyl -4-(2,2,2-tri fluoroethoxy) pyridin-2-yl] methyl sulfinyl)-1H benzoimidazole, CS2 and NaOH in methanol as solvent. From reaction of dithiocarbamate salt (NaL) with metal ions (M); Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Pd(II)”, have obtained the DTC complexes at general molecular formula [M(L)2(H2O)2] and [Pd(L)2]. To characterize the ligand and its complexes, used different analyses methods such FTIR, UV-Vis, elemental microanalysis, atomic absoreption, magnetic susceptibil
... Show MoreWater pollution has created a critical threat to the environment. A lot of research has been done recently to use surface-enhanced Raman spectroscopy (SERS) to detect multiple pollutants in water. This study aims to use Ag colloid nanoflowers as liquid SERS enhancer. Tri sodium phosphate (Na3PO4) was investigated as a pollutant using liquid SERS based on colloidal Ag nanoflowers. The chemical method was used to synthesize nanoflowers from silver ions. Atomic Force Microscope (AFM), Scanning Electron Microscope (SEM), and X-ray diffractometer (XRD) were employed to characterize the silver nanoflowers. This nanoflowers SERS action in detecting Na3PO4 was reported and analyzed
... Show MoreEducation specialists have differed about determining the best ways to detect the
talented. Since the appearance of the mental and psychological measurement movement, some
scholars adopted intelligence ratios as a criterion to identify the talented and others went to
rely on the degree of academic achievement. Each of these two methods has its own flaws and
mistakes and a large number of talented children were victims of these two methods.
Therefore the need to use other scales for the purpose of detection of talented children
appeared because they provide valuable information which may not be obtained easily
through objective tests and these scales are derived from consecutive studies of gifted andtalented children
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show More