The researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes with octahedral geometry except Mn complex has tetrahedral geometry. The Ligand functions as a neutral tridentate ligand in all complex investigations, coordinating Cr(III), Zn(II), Ru(III), and Rh(III) ions via the N atom of amine and azo groups, as well as the O phenolic OH group. When coordinated with the Cu(II), Co(II), and Mn(II) ions via the two N atoms of the amine and azo groups, this Ligand functions as a neutral bidentate.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph
This study investigates the complex challenges of managing heritage sites in Iraq, focusing on the Prophet Tho Al-Kifl Shrine in Babylon due to its religious, historical, and architectural significance. The site exemplifies critical management issues, including institutional fragmentation, limited technical and financial resources, and insufficient legislative frameworks. Left unaddressed, these challenges threaten the site's material integrity and symbolic identity through uncoordinated interventions and neglect. The research aims to propose a context-sensitive framework for sustainable heritage management by combining theoretical perspectives with practical analysis. Using a case study methodology, the study draws on field observations, h
... Show MoreAbstract
The changes that happened in the environment of business have great effects upon organizations with different activities specially the banks which requires the existence of an able opinion resources can adapt with the changes . Accordingly importance put upon intellectual capital which become one of the basic resources for organizations and one of success and growth elements with the availability of expertise , skills and capability of making essential changes in different process due to the presentation of innovations and creations of the to support banks activities .Therefore the intellectual capital represents the more r
... Show MoreCarbon nanoparticles are prepared by sonication using carbon black powder. The surface morphology of carbon black (CB) and carbon nanoparticles (CNPs) is investigated using scanning electron microscopy (SEM). The particles size ranges from 100 nm to 400 nm for CB and from 10 nm to 100 nm for CNPs. CNPs and CB are mixed with silicon glue of different ratios of 0.025, 0.2, 0.05, and 0.1 to synthesis films. The optical properties of the prepared films are investigated through reflectance and absorbance analyses. The ratio of 0.05 for CNPs and CB is the best for solar paint because of its higher solar water heater efficiency and is then added to the silicon glue . Temperature of cold water and temperature of hot water in storage tank were ta
... Show MoreThe electron correlation effect for inter-shell have been analysed in terms of Fermi hole and partial Fermi hole for Li-atom in the excited states (1s2 3p) and (1s2 3d) using Hartree-Fock approximation (HF). Fermi hole Δf(r12) and partial Fermi hole Δg(r12 ,r1) were determined in position space. Each plot of the physical properties in this work is normalized to unity. The calculation was performed using Mathcad 14 program.
Background: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show MoreThe issue of insurance against unlawful risks raises a jurisprudential and judicial debate between two opposing trends: the first considers coverage of these risks invalid due to their impact on public order or morals, while the second—which this research analyses—calls for the possibility of covering these risks in specific circumstances, based on contractual considerations in accordance with the principle that the contract is the law of the contracting parties, and based on the obligation to compensate the harmed third party—the victim—who has no connection to the unlawful act. In this context, our research highlights that contractual considerations can justify coverage of some unlawful risks, provided that the goal is to achieve
... Show More