5-((2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)phenyl)diazenyl)quinolin-8-ol azo ligand (L) has been synthesized through the reaction of diazonium salt for 2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)aniline with 8-hydroxyquinoline. The azo ligand (L) was characterized utilizing spectroscopic techniques, including FTIR, UV-Vis, 1H and 13C NMR, as well as mass spectrometry and micro-elemental analysis (C.H.N). Metal complexes containing Co(II), Ni(II), Cu(II), and Zn(II) were synthesized and analyzed through mass spectrometry, flame atomic absorption, elemental analysis (C.H.N), infrared and UV-Vis spectroscopy, along with measurements of conductivity and magnetic properties. The experimental findings suggested that all metal complexes exhibited a 1:2 metal-to-ligand ratio and possessed a tetrahedral geometry. The biological activity of these compounds was assessed. Additionally, in the composite materials created for dyeing cotton fabrics, the hues influenced the brightness and detergent stability. KEY WORDS: Quinoline, Textile industry, Azo dyes, Dyeing performance, Microbial evaluations Bull. Chem. Soc. Ethiop. 2025, 39(12), 2559-2569 DOI: https://dx.doi.org/10.4314/bcse.v39i12.15
Abstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MoreCefixime is an antibiotic useful for treating a variety ofmicroorganism infections. In the present work, tworapid, specific, inexpensive and nontoxic methods wereproposed for cefixime determination. Area under curvespectrophotometric and HPLC methods were depictedfor the micro quantification of Cefixime in highly pureand local market formulation. The area under curve(first technique) used in calculation of the cefiximepeak using a UV-visible spectrophotometer.The HPLC (2nd technique) was depended on thepurification of Cefixime by a C18 separating column250mm (length of column) × 4.6 mm (diameter)andusing methanol 50% (organic modifier) and deionizedwater 50% as a mobile phase. The isocratic flow withrate of 1 mL/min was applied, the temper
... Show MoreScrophularia. striata from Scrophulariacea family has been used in Iranian folk medicine for the treatment of infectious diseases. In this study we evaluated the synergistic effect of S. striata hydroalcoholic extract (SSE) and commercially available antibiotics against P. aeroginosa and Methicillin- resistant Staphylococcus aureus (MRSA). The resazurin-based microdilution method was used to determine the minimum inhibitory concentration (MIC) values of plan extract and standard antibiotics. The interaction between standard antibiotics and SSE was evaluated by using checkerboard method. The results of this study revealed that SSE enhance the antibacterial activity of antibiotics. The combin
... Show MoreA survey of entomopathogenic and other opportunistic fungi isolated from soil samples collected from insect hibernation sites in different habitats in Kurdistan region of Iraq was carried out during October to December 2009. By using dilution plate method, two entomopathogenic species (Beauveria bassiana (Bals.) Vuill.and Isaria javanica (Friedrichs & Bally) Samson & Hywel-Jones) were detected with isolation percentage (38.46%) each. Other opportunistic fungi such as Alternaria alternata, Aspergillus flavus, A.niger, Penicillium glabrum, P. digitatum, Rhizopus stolonifer and Syncephalastratum racemosum
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
الأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreThis study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreSome responses to ancient grammarians
And contemporary researchers
In monograms