The study includes preparation and characterisation of mixed azo-linked Schiff-base ligands and their complexes. The starting material was isolated from the mixing of 2-amino pyridine diazonium salt with 2-amino-phenole and 4-amino-3- hydroxy-1-naphthalene sulfonic acid respectively in 1:1 mole ratio in water. In this work, the formation of azo-linked Schiffbase ligands are reported. Ligands of the azo-linked Schiff-base was achieved by the reaction of starting material with 4- (dimethylamino) benzaldehyde) (HL1 and HL2). The complexes were prepared by mixing the azo-linked Schiff-base ligands with the metal salts; CoII, NiII and CdII in a 1:1:1 mole ratio. Ligands and complexes were characterised by analytical and spectroscopic analyses including; microanalysis, chloride content, thermal analysis, magnetic susceptibility for complexes, conductance, FTIR, UV-Vis and 1H-NMR spectroscopy. Physico-chemical techniques indicated complexes demonstrated six coordinate structures in the solid and solution sate. Biological activity of the ligands and their metal complexes were screened for their antimicrobial activity against four bacterial species (Escherichia coli and Enterobacter (G-)), (Bacillus stubtilis and Staphylococcus aureus (G+)).
Objective: The purpose of this study was to determine the association between caries related microorganisms in children’s saliva, such as Streptococcus mutans and lactobacilli, and their demographic factors. Methods: This study involved a sample of 135, both sexes with an age range between 3 and 10 years. Unstimulated saliva was obtained and diluted in normal saline. Saliva was then placed in selective media. Salivaris agar was used for mutans streptococci while Rogosa agar for lactobacilli. After incubation, Streptococcus mutans counting of CFU (colony forming units) with morphology characterization and numbers of CFU per milliliter of saliva for lactobacilli. Demographic factors information was collected using a questionnaire.
... Show MoreIn Nathaniel Hawthorn's The Scarlet Letter, love and hate appear as independent powers that consume their holders. In this novel, Nathaniel Hawthorn presents a picture of the Puritans which shows an important part of American history. The Scarlet Letter outlines the American's brief moment of theocracy and extreme social order. Hawthorn is one of the first American writers to explore the hidden motivations of his characters. The Puritans wanted to establish an ideal community in America that can act as a model of influence for what they saw as a corrupted civil and religious order in England. This sense of mission is the core of their religious and social identity. That is why they required a strict moral regulation. The research tackles th
... Show MoreCultural and identity scars have been engraved in the body of ethnic minority of Muslims in America due to the bloody attacks of 9/11. These events have created thus traumatic experiences on the party who witnessed the events at close and the people on whom the blame is conclusively directed, Muslim Americans. For Americans, the attacks resulted in a proud reassertion of the national virtue and communal integrity from which Muslim Americans were excluded. This reassertion is accompanied for Muslims by a reconstruction of a cultural identity away from their origin homeland and under pressures and prejudices that made the process of reconstruction to be severely challenging. Accordingly, the challenge needed to be portrayed to overcome the d
... Show MoreThis study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreA simple, sensitive and accurate spectrophotometric method has been developed for the determination of salbutamol sulphate (SAB) and isoxsuprine hydrochloride (ISX) in pure and pharmaceutical dosage. The method involved oxidation of (SAB) and (ISX) with a known excess of N-bromosuccinamid in acidic medium, and subsequent occupation of unreacted oxidant in decolorization of Evans blue dye (EB). This, in the presence of SAB or ISX was rectilinear over the ranges 1.0-12.0, 1.0-11.0 µg/mL, with molar absorptivity 4.21×104 and 2.58×104 l.mol-1.cm-1 respectively. The developed method had been successfully applied for the determination of the studied drugs in their pharmaceutical dosage resulting i
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show More