Series of new complexes of the type [M2 (L)Cl4 ] are prepared from the new ligand[N1 ,N4 -bis(benzo[d]thiazol-2- yl)succinamide (L) derived from ethan-1,2-dicarbonyl chloride and 2-aminobenzothiozole,where, M= Ni(ii), Cu(ii) and Zn(ii) alsocomplexes of mix-ligands, the type [M(L)(8-HQ)]Cl, where, M = Ni(ii), Cu(ii) and Zn(ii),8-HQ= 8-Hydroxyquinoline. Chemical forms are obtained from their 1 H, 13CNMR, Mass spectra (for (L)), FT-IR and U.V spectrum, melting point, molar conduct.Using flame (AA), % M is determined in the complexes.The content of C, H, N and S in the (L) and its complexes was specified. Magnetic susceptibility and thermal analysis (TGA) of prepared compounds were measured.The propose geometry for all complexes[M2 (L)Cl4 ] was tetrahedral while for [M(L)(8-HQ)]Cl was octahedral. By the weight loss method in a 0.1M H2 SO4 solution for mild steel,corrosion inhibition of the (L) was evaluated. Anti-bacterial activity of the (L) and theircomplexes was examined for two type of bacteria. TGA studies of ligand and nickel complex show multi-step decomposition pattern of their organic frameworks.
Thin films of Mn2O3 doped with Cu have been fabricated using the simplest and cheapest chemical spray pyrolysis technique onto a glass substrate heated up to 250 oC. Transmittance and absorptance spectra were studied in the wavelength range (300 -1100) nm. The average transmittance at low energy was about 60% and decrease with Cu doping, Optical constants like refractive index, extinction coefficient and dielectric constants (εr), (εi) are calculated and correlated with doping process.
Biomimicry, as a way of thinking to go back to nature for inspiration, has its impact on many contemporary technological achievements. Some of them are used to design and construct kinetic facades in architecture, because of the importance role of facades in reducing sun radiation, that enter the building through using shading systems and components. In light of this, research problem is determined: "Do technologies which are inspired by biomimicry effect shading in kinetic facades through its characteristics in materials and the mechanics. So the research identifies its goal as: "To identify the types of kinetic facades in buildings and their characteristics as materials and shading mechanism associated with the b
... Show MoreNanotechnology is a modern and developed technology, which have great importance in many fields of medicine (diagnosis and treatment). Also, it used to prevent and solve many problems related to animal production and health. The Nanosystems are including metallic nanoparticles, liposomes, polymeric Nanospheres, polymeric micelles, carbon nanotubes, functionalized fullerenes, polymer-coated Nanocrystals, dendrimers and Nanoshells. Our review showed a details classification of nanoparticles and their uses. Nanoparticles have several features depended on the size, colossal surface. The development of antibiotics nanoparticle is very important and has an excellent impact in treating bacterial infections wherever the antibiotics nanopar
... Show MoreIn this work the design and application of a fuzzy logic controller to DC-servomotor is investigated. The proposed strategy is intended to improve the performance of the original control system by use of a fuzzy logic controller (FLC) as the motor load changes. Computer simulation demonstrates that FLC is effective in position control of a DC-servomotor comparing with conventional one.
The Russian foreign policy of the post-cold-war era faced dilemmas in the light of the international and regional realities of the disintegration of the Soviet Union and the formation of a new unipolar international order led by the United States of America. Thus, Russian foreign policy-making was divided over the nature of the foreign policy to be followed. The achievement of the Russian goals, especially as the objectives of Russian foreign policy have been set within the framework of trying to regain the status and leading role, as well as the establishment of some fundamental changes to be consistent with the new international situation of the post-one The Russian Federation has adopted in the sphere of its foreign policy to the vari
... Show MoreBackground: This study aimed to evaluate the outcome of long-term results of dacryocystorhinostomy (DCR) techniques in specialized eye care center in Iraq.
Subjects and Method: This is a prospective study of 650 patients from July 2014 to July 2019 with nasolacrimal duct obstruction in Ibn Al Haitham Eye Teaching Hospital. A preoperative questionnaire was done, then one month, three months, six months and one year postoperatively. The success of surgery defined as follow; Absence of epiphora completely, Resolve of dacryocele or mucocele or any new attack of daryocystitis, Appearance of fluorescein dye from nose in fluorescein disappearance test, Successful irriga
... Show MoreObjective: The aim of the study is assessing middle age women's knowledge toward household hazards, In primary health care centers at AL-Amara City. Methodology: A descriptive and analytic design is accomplish on non probability (Purposive sample) consisting of 150 middle age women select from four primary health care centers at AL-Amara City (AL-Uroba Primary Health Care Center,AL Zahraa Primary Health Care Center ,AL Hasen AL-Askerry Primary Health Care Center ,and Ali AL-Ridha Primary Health Care Center.) These centers are choose randomly from 21 primary health care centers in the first sector. The study is
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More