This paper concerns is the preparation and characterization of a bidentate ligand [4-(5,5- dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl) benzene sulfonamide]. The ligand was prepared from fusing of sulfamethoxazole and dimedone at (140) ºC for half hour. The complex was prepared by refluxing the ligand with a bivalent cobalt ion using ethanol as a solvent. The prepared ligand and complex were identified using Spectroscopic methods. The proposed tetrahedral geometry around the metal ions studied were concluded from these measurements. Both molar ratio and continuous variation method were studied to determine metal to ligand ratio (M:L). The M to L ratio was found to be (1:1). The adsorption of cobalt complex was carried out using bentonite as adsorbent. The optimization of the adsorption conditions were studied as a function of contact time , temperature , pH , adsorbent weight and particle size. The results revealed that the time needed to reach concentration equilibrium was 60 min for cobalt complex. While the trend of the adsorption isotherm was L1 type according to Giles classification . Thermodynamic functions (ΔH, ΔG, and ΔS) were calculated.
Due to the deliberate disposal of industrial waste, a great amount of petroleum hydrocarbons pollute the soil and aquatic environments. Bioremediation that depends on the microorganisms in the removal of pollutants is more efficient and cost-effective technology. In this study, five rhizobacteria were isolated from Phragmites australis roots and exposed to real wastewater from Al-Daura refinery with 70 mg/L total petroleum hydrocarbons (TPH) concentration. The five selected rhizobacteria were examined in a biodegradation test for seven days to remove TPH. The results showed that 80% TPH degradation as the maximum value by Sphingomonas Paucimobilis as identified with Vitek® 2 Compact (France).
Lactiplantibacillus plantarum, one of lactic acid bacteria (LAB), is found in various foods, including dairy products, meat, and vegetables, and most of these bacteria offer beneficial effects to humans and animals as potential probiotics with broad-spectrum antimicrobial activities. The aim of this study was evaluating the antibacterial efficacy of L. plantarum against some foodborne bacteria isolated from dairy products. This research involved 34 dairy products, including local and imported milk, cheese, and yogurt sold locally in Baghdad province, Iraq, during May 2022. For the isolation of L. plantarum, a special medium called MRS (de Man Rogosa and Sharpe) was applied. Colonie
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThis paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.
This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.
A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the
... Show MoreDBN Rashid, Rimak International Journal of Humanities and Social Sciences, 2020
Judicial jurisprudence is one of the important legal solutions to address the shortcomings of legislation. Throughout its long history, human societies have known many cases in which the judge finds himself facing a legislative vacuum in addition to civil legal texts that are difficult for the judge to implement due to ambiguity or contradiction, which requires diligence. To rule on resolving disputes before him in order not to deny justice, but the judge in his jurisprudence was not absolute, but rather bound by certain controls represented by observing the wisdom of legislation on the one hand and taking into account the nature of the texts on the other side, and from here this research came to shed light on the jurisprudence and its cont
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More