The researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes with octahedral geometry except Mn complex has tetrahedral geometry. The Ligand functions as a neutral tridentate ligand in all complex investigations, coordinating Cr(III), Zn(II), Ru(III), and Rh(III) ions via the N atom of amine and azo groups, as well as the O phenolic OH group. When coordinated with the Cu(II), Co(II), and Mn(II) ions via the two N atoms of the amine and azo groups, this Ligand functions as a neutral bidentate.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreThis paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.
... Show MoreThe new organic reagent 2-[Benzo thiazolyl azo]-4,5-diphenyl imidazole was prepared and used as complexing agent for separation and spectrophotometric determination of Cu2+ ion in some samples include plants, soil, water and human blood serum. Initially determined all factors effect on extraction method and the results show optimum pH was (pHex=9), optimum concentration was 40?g/5mLCu2+ and optimum shaking time was (15min.), as well stoichiometry study appears the complex structure was 1:1 Cu2+: BTADPI. Interferences effect of cations were studied. Synergism effect shows MIBK gave increasing in distribution ratio (D). Organic solvent effect appears there is no any linear relation between dielectric constant for organic solvent used and dis
... Show MoreThe scholastic view of public religion differed, and this difference was on two extremes. All economic schools agreed that public debt is a monetary liquidity that was unjustly deducted from the income and output cycle as a result of the imbalance in the economic balance and the departure from the conditions of balance between aggregate demand and aggregate supply. Debt is a waste of financial resources allocated to productive accumulation. Except for the Keynesian school, which considers public debt to be an addition to aggregate demand after the decline in the role of the private sector in investment as a result of pessimistic expectations that warn of signs of economic contraction. Public debt is linked to the ex
... Show MoreIn this study; the genus of Sinoxylon Duftschmid, 1825 (Coleoptera, Bostrichidae) was revised. There were 3 species registered in our investigations: S. anale Lesne, 1897; S. ceratoniae (Linnaeus, 1758) and S. muricatum (Olivier, 1790), the last species was redescribed as being found for the first time for the Iraqi faunal insects. Key to the species were constructed and supported by figures of the main diagnostic characters and some morphological features.
In this paper has been one study of autoregressive generalized conditional heteroscedasticity models existence of the seasonal component, for the purpose applied to the daily financial data at high frequency is characterized by Heteroscedasticity seasonal conditional, it has been depending on Multiplicative seasonal Generalized Autoregressive Conditional Heteroscedastic Models Which is symbolized by the Acronym (SGARCH) , which has proven effective expression of seasonal phenomenon as opposed to the usual GARCH models. The summarizing of the research work studying the daily data for the price of the dinar exchange rate against the dollar, has been used autocorrelation function to detect seasonal first, then was diagnosed wi
... Show MoreAbstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show More