The formation, structural characterization of mixed ligand complexes of Co II, Zn II, Cd II and Hg II metal ions with the Schiff base ligand (Z)-3,4,5-trihydroxy-N'-(4-hydroxybenzylidene) benzohydrazide and 8-hydroxyquinolineare reported. Ligand and complexes were characterized by analytical and spectroscopic analyses including; FTIR, electronic and 1H, 13C-NMR spectroscopy, microanalysis, chloride content, thermal analysis, magnetic susceptibility and conductance. Physico-chemical techniques indicated the formation of complexes with fourcoordinated arrangement in the solid and solution state. Biological activity of the prepared ligand and their mixed complexes were screened for their antimicrobial activity against four bacterial species (Staphylococcus aureus and Bacillus subtitles (G+)), Enterobacter and Escherichia coli (G-)). Biological data showed that complexes become potentially more active against these tested bacteria compared with the free ligands
The present study envisaged utilizing 4-aminoantipyrine as key intermediate for the synthesis of some new derivatives bearing anti-bacterial and anti-cancer activities moieties viz., antipyrine diazenyl benzaldehydes 2(ad) which were obtained by coupling of diazotized 4-aminoantipyrine (1) with substituted benzaldehydes at 0◦C (iced) temperature. The other antipyrine derivatives where containing bis heterocycles like bis thiazolidinone-antipyrine (4), bis imidazolidinone -antipyrine (5) and bis azetidinone -antipyrine (6).These compounds were prepared through the reaction between 4- aminoantipyrine and terephthaldicarboxaldehyde to get (3) which were reacted with mercaptoacetic acid , glycine or chloroacetyl chloride separately to get com
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MorePrecision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More
Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.
Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .
Type of the study: Cross-sectional study.
Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017 on 229 goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(
... Show MoreBACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr
... Show MoreIn this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show More