The study includes preparation and characterisation of mixed azo-linked Schiff-base ligands and their complexes. The starting material was isolated from the mixing of 2-amino pyridine diazonium salt with 2-amino-phenole and 4-amino-3- hydroxy-1-naphthalene sulfonic acid respectively in 1:1 mole ratio in water. In this work, the formation of azo-linked Schiffbase ligands are reported. Ligands of the azo-linked Schiff-base was achieved by the reaction of starting material with 4- (dimethylamino) benzaldehyde) (HL1 and HL2). The complexes were prepared by mixing the azo-linked Schiff-base ligands with the metal salts; CoII, NiII and CdII in a 1:1:1 mole ratio. Ligands and complexes were characterised by analytical and spectroscopic analyses including; microanalysis, chloride content, thermal analysis, magnetic susceptibility for complexes, conductance, FTIR, UV-Vis and 1H-NMR spectroscopy. Physico-chemical techniques indicated complexes demonstrated six coordinate structures in the solid and solution sate. Biological activity of the ligands and their metal complexes were screened for their antimicrobial activity against four bacterial species (Escherichia coli and Enterobacter (G-)), (Bacillus stubtilis and Staphylococcus aureus (G+)).
Browse Iraqi academic journals and research papers
Iron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconduc
... Show MoreThe purpose of this study is to explore whether the adoption of Beyond Budgeting (BB) as a management accounting practice (MAP) contributes to developing intellectual capital (IC) and creating value in Iraqi companies. This requires an understanding of the views of the Iraqi managers about the nature of the information provided by this practice, which may be used to determine whether this information is relevant in the management of IC in the context of Iraq. This research aims also to explore the challenges of the adoption of the BB in planning and controlling IC in Iraq. The study adopts a qualitative approach and an interpretive paradigm. It also adopts a semi-structured interview method of collecting data from executive managers
... Show MoreMaher Harbi's drawings have taken an aesthetic and artistic dimension that leads to creating an approach between what is religious and mundane, between religious and mundane, with the techniques of plastic art, and this is what led the researcher to address this topic and stand on the realistic controversy based on the religious and the secular. Accordingly, the researcher divided the subject of the research into four chapters. The first chapter (the methodological framework) dealt with the research problem, which is summarized in the following question: (What is the dialectic of the reality of Maher Harbi’s drawings between the religious and the secular?) Then the importance of the research manifested in shedding light on the deep str
... Show MoreThe power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha
... Show MoreThis study aims to formulate azithromycin oleogel to locally treat skin infections such as acne vulgaris and skin wound infection. Providing a form of azithromycin that can be administered topically is highly desired to prevent unwanted systemic complications including diarrhea, nausea, and abdominal pain. Additionally, it will avoid first pass metabolism, improves patient acceptance, provides an alternative in nauseated patients, decreases the dose by direct contact with the pathological site, and provides a noninvasive and convenient mode of administration. Furthermore, for treating wound infections, the gel will act as a scaffold biomaterial for wound closure besides its antibacterial effect. Herein, we propose the use of grapeseed oil-b
... Show MoreThe emergence of such widespread pharmaceuticals as a pollutant has become one of the world's critical environmental problems that may lead to both the public's health and biodiversity deterioration. This article provides an exhaustive account of the current understanding of the environmental persistence of pharmaceutical contaminants following in-depth analysis of the additive effects of existing natural biodegradation pathways on the human health impact of these drugs. Paying special attention to biodegradation decomposing agents such as bacteria, fungi, and algae the paper estimates their ability to convert drug ingredients to compound that is eventually less toxic. Although these biologic systems contain an enormous potential fo
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More