Sixteen new complexes with the general formula [M(L)2(H2O)2] were prepared resulting from the reaction of the two new Schiff base ligands, which are: - L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, mercury) and (tetravalent platinum). Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is linked to the metal ions via the nitrogen atoms are the isomethene group and the oxygen is the hydroxide group of the pyrazoline ring. The two prepared ligands are distinguished by their ability to dissolve in organic solvents such as alcohols, ether, acetone, chloroform, carbon tetrachloride and ethanol, and their inability to dissolve in water. The prepared compounds were characterized using infrared spectroscopy and spectroscopy nuclear magnetic resonance, ultraviolet spectroscopy, micro-analysis of elements (C.H.N), atomic absorption analysis, electrical conductivity of solutions of complexes at a concentration of 1×10-3 , the magnetic susceptibility of the complexes was measured, and the effect of the solvent on the prepared compounds was studied, and from the results of the measurements, the octahedral geometric structure of the prepared complexes was proposed.. The inhibitory ability of the prepared compounds was tested against two types of selected bacteria, Staphylococcus aureus and Escherichia coli, and a type of fungus, Candida. The results showed that the ability of the metal complexes to inhibit is higher than the ligand.
This study includes design and synthesis of new non-steroidal anti-inflammatory agents (NSAIDs) with expected cyclooxygenase-2 (COX-2) selective inhibition to achieve better activity and low gastric side effects. Two series of compounds have been designed and synthesized as potential NSAIDs,these are: Salicylamide derivatives (compounds 3,4,5 ) and Diflunisal derivatives (compounds 10&11). In vivo acute anti-inflammatory effect of one of the synthesized agents (compound 3) was evaluated in the rat using egg-white induced paw edema model of inflammation. Preliminary pharmacological study revealed that compound 3 exhibited less anti-inflammatory effect compared to that of aspirin after
... Show MoreThe preparation of composite metal oxide to attain high efficiency in removing phenol from wastewater has a great concern. In the present study, the focus would be on adopting antimony-tin oxide coating onto graphite substrates instead of titanium; besides the effect of SbCl3 concentration on the SnO2-Sb2O3 composite would be examined. The performance of this composite electrode as the working electrode in the removal of phenol by sonoelectrochemical oxidation will be studied. The antimony-tin dioxide composite electrode was prepared by cathodic deposition with SnCl2 . 2H2O solution in a mixture of HNO3 and NaNO3, with different concentrations of SbCl3. The SnO2-Sb2O3 deposit layer’s structure and morphology were examined and the 4 g/l Sb
... Show MoreLaboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality du
... Show MoreA number of ehemical ion materials were used as an absorber against solar energy. These materials were selected according to their absorption spectra in the wavelength range 300-800nm where the solar spectrum is coventrated. A solar olleetorw^esigd and The ability of each material inside the collector for absorbing the solar radiation was examined by a converter parameter “R”.According to the “R” parameter, the cohaltous and copperic ions material seems to be of higher capability for absorbing solar energy than the other materials.All the results were analyzed by means of a least-squared fitting program.
In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
The purpose of this paper is to give some results theorems , propositions and corollaries concerning new algebraic systems flower , garden and farm with accustomed algebraic systems groupoid , group and ring.
In May 20th. 1985 two species of aphids were found on the roots of Vicia faba L. in Hammam region 30 Kilometer south of Mosul. Samples of these aphids were sent to the Commonwealth Institute of Entomology, London. ( No. 17002/9804 Asia ) and identified as being Smynthurodes betas westwood and Dysaphis crataegi (Kaltenbach) (APhididae : Homoptera). The first species was dominant. The latter species was also noticed on the roots of the common bishop's weed (Ammi majus L.) and on the wide carrot (Daucus carrota L.) of the family Umbelliferae (Bodenheimer & Swirski, 1957).
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More