(E)-2-(benzo[d]thiazol-2-yliazenyl)-4-methoxyaniline was synthesized by reaction the diazonium salt of 2-aminobenzothiazole with 4-methoxyaniline. Identified of the ligand by spectral techniques (UV-Vis, FTIR,1HNMR and LC-Mass) and microelemental analysis (C.H.N.S.O) are used to produce of the azo ligand. Complexes of (Co2+, Ni2+, Cu2+ and Zn2+) were synthesized and identified using atomic absorption of flame, elemental analysis, infrared and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied followed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4-3×10-4 mole/L). height molar absorptivity of compound solutions have been noticed. Analytical data showed that all the complexes out to 1:2 metal-ligand ratio. At the radix for physicochemical datum an octahedral structure have been described at compounds. other than the biological studies of all produced compounds was evaluation against different kinds of antimicrobial strains.
A survey of entomopathogenic and other opportunistic fungi isolated from soil samples collected from insect hibernation sites in different habitats in Kurdistan region of Iraq was carried out during October to December 2009. By using dilution plate method, two entomopathogenic species (Beauveria bassiana (Bals.) Vuill.and Isaria javanica (Friedrichs & Bally) Samson & Hywel-Jones) were detected with isolation percentage (38.46%) each. Other opportunistic fungi such as Alternaria alternata, Aspergillus flavus, A.niger, Penicillium glabrum, P. digitatum, Rhizopus stolonifer and Syncephalastratum racemosum
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
الأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreThis study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreSome responses to ancient grammarians
And contemporary researchers
In monograms
Set dietary program for some of dietary supplements and training for badminton young players, and identifying effect of taking some of the dietary supplementary for badminton young players. The research population :( badminton young players group (Arminian club). For age group (16-18) years the sample is divided in to two experimental groups within each group (6) players, and two for the exploratory experiment which was within the research sample, they were divided in to two groups, the first group take some of the dietary supplements (multivitamin creating) .the set exercises by the researchers in the main part of the training unit and the second group (amino acids, vitamins) and the set exercises by the researcher. The scientific approach
... Show MoreThis study was conducted to evaluate the efficacy of different techniques for extraction and purification of Tomato yellow leaf curl virus (TYLCV). An isolate of the virus free of possible contamination with other viruses infecting the same host and transmitted by the same vector Bemisia tabaci Genn. was obtained. This was realized by indicator plants and incubation period in the vector. Results obtained revealed that the virus infect Nicotiana glutinosa without visible symptoms, while Nicotiana tabaccum var. White Burley was not susceptible to the virus. The incubation period of the virus in the vector was found to be 21 hrs. These results indicate that the virus is TYLCV. Results showed that Butanol was more effective in clarification the
... Show More