Synthesis of a new class of Schiff-base ligand with a tetrazole moiety to form polymeric metal complexes with CoII, NiII, ZnII, and CdII ions has been demonstrated. The ligand was synthesised by a multi-steps by treating 5-amino-2-chlorobenzonitrile and cyclohexane -1,3-dione, the 5,5'-(((1E,3E)-cyclohexane-1,3-diylidene)bis(azanylylidene))bis(2-chlorobenzonitrile) was obtained. The precursor (M) was prepared from the reaction 5,5'-(((1E,3E)-cyclohexane-1,3-diylidene)bis(azanylylidene))bis(2-chlorobenzonitrile) with NaN3 to obtained (1E,3E)-N1,N3-bis(4-chloro-3-(1H-tetrazol-5-yl)phenyl)cyclohexane-1,3-diimine (N). By reacting the precursor (M) with CS2/KOH, the required ligand was synthesised. Co (II), Ni (II), Zn (II), Cd (II) ions produce polymeric metal complexes with the formula [M(L)]n when they react with the ligand (L). These complexes were synthesised using the same methods. The geometrical structure of ligand and their polymeric complexes were determined using FTIR, 1H, 13C-NMR, electronic spectroscopy, ESMS, magnetic susceptibility, metal and chloride contents, micro elemental analysis and conductance. From the results ,we conclude that the L-complexes demonstrate the production of four-coordinate complexes with tetrahedral geometry for Co(II), Zn(II), and Cd(II), and square planer geometry for Ni (II). We examined the antibacterial activity of both ligand and complexes with two types of bacteria positive (Bacillus stubtili and Staphylococcus aureus ) and negative (Escherichia coli and Pseudomonas aeruginosa ) with concentration 10-2.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIn this paper, a new seven-parameter Mittag-Leffler function of a single com-plex variable is proposed as a generalization of the standard Mittag-Leffler function, certain generalizations of Mittag-Leffler function, hypergeometric function and confluent hypergeometric function. Certain essential analytic properties are mainly discussed, such as radius of convergence, order, type, differentiation, Mellin-Barnes integral representation and Euler transform in the complex plane. Its relation to Fox-Wright function and H-function is also developed.
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show More* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2
This paper deals with constructing mixed probability distribution from mixing exponential
The main objective of this work is to introduce and investigate fixed point (F. p) theorems for maps that satisfy contractive conditions in weak partial metric spaces (W.P.M.S), and give some new generalization of the fixed point theorems of Mathews and Heckmann. Our results extend, and unify a multitude of (F. p) theorems and generalize some results in (W.P.M.S). An example is given as an illustration of our results.