The researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes with octahedral geometry except Mn complex has tetrahedral geometry. The Ligand functions as a neutral tridentate ligand in all complex investigations, coordinating Cr(III), Zn(II), Ru(III), and Rh(III) ions via the N atom of amine and azo groups, as well as the O phenolic OH group. When coordinated with the Cu(II), Co(II), and Mn(II) ions via the two N atoms of the amine and azo groups, this Ligand functions as a neutral bidentate.
Stability of laminated plate under thermal load varied linearly along thickness, is developed using a higher order displacement field which depend on a parameter “m”, whose value is optimized to get results closest to three-dimension elasticity results. Hamilton, s principle is used to derive equations of motion for laminated plates. These equations are solved using Navier-type for simply supported boundary conditions to obtain non uniform critical thermal buckling and fundamental frequency under a ratio of this load. Many design parameters of cross ply and angle ply laminates such as, number of layers, aspect ratios and E1/E2 ratios for thick and thin plates are investigated. It is observed that linear and uniform distribution of
... Show MoreTo enhance interfacial bonding between carbon fibers and epoxy matrix, the carbon fibers have been modified with multiwall carbon nanotubes (MWCNTs) using the dip- coating technique. FT-IR spectrum of the MWCNTs shows a peak at 1640 cm−1 corresponding to the stretching mode of the C=C double bond which forms the framework of the carbon nanotube sidewall. The broad peak at 3430 cm−1 is due to O–H stretching vibration of hydroxyl groups and the peak at 1712 cm−1 corresponds to the carboxylic (C=O) group attached to the carbon fiber. The peaks at 2927 cm−1 and 2862 cm−1 ar
Water is the basis of the existence of all kinds of life, so obtaining it with good quality represents a challenge to human existence and development especially in the desert and remote cities because these areas contain small populations and water purification requires great materials and huge amounts of fossil fuels resulting pollution of the environment. Cheap and environmentally friendly desalination methods have been done by using solar distillations. Passive solar stills have low yields, so in this research, the problem is overcome by connecting four heat pipes which are installed on the parabolic concentrator reflector with passive solar still to increase the temperature of hot water to more than 90°C, as a resul
... Show MoreThis study investigates the possibility of using waste plastic as one of the components of expired lead-acid batteries to produce lightweight concrete. Different percentages of lead-acid battery plastic were used in the production of lightweight concrete. The replacements were (70, 80 and 100%) by volume of the fine and coarse aggregate. Results demonstrated that a reduction of approximately 23.6% to 35% in the wet density was observed when replacement of 70% to 100% of the natural aggregate by lead-acid battery plastic. Also, the compressive strength decreased slightly with the increase in plastic content at different curing ages of 7, 28, 60, 90, 120 days. The lowest value of compressive strength was (20.7 MPa) for (wa
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreThis systematic review aimed to analyse available evidence to answer two focused questions about the efficacy of erythritol powder air‐polishing (EPAP) (i) as an adjunctive during active periodontal therapy (APT) and (ii) as an alternative to hand/ultrasonic instrumentation during supportive periodontal therapy (SPT). Additionally, microbiological outcomes and patient's comfort/perceptions were assessed as secondary outcomes.
PubMed, Cochrane and Medline were searched for relevant articles published before February 2021 following PRISMA guidelines. The search was conducted by three indep
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show More
