D-mannose sugar was used to prepare [benzoic acid 6-formyl-2, 2-dimethyl-tetrahydrofuro [3, 4-d][1, 3] dioxol-4-yl ester](compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption AA,(FT-IR),(UV-Vis), TLC, ES mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol),(metal: ligand: 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2 [M2 (L)(HA) 2] where M= Co (II), Ni (II), Cu (II) and Cd (II). These complexes were characterized by eleme
... Show MoreD-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2[M2(L)(HA)2] where M= Co(II), Ni(II), Cu(II) and Cd(II). These complexes were characterized by elem
... Show MoreD-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2[M2(L)(HA)2] where M= Co(II), Ni(II), Cu(II) an
... Show MoreThis study aimed to know the impact of the capital structure measured by the ratio of financing to short-term capital and the ratio of financing to long-term capital on the profitability of companies, as measured by the rate of return on assets and the rate of return on equity. The study was applied to industrial sector companies listed in the Iraq Stock Exchange. The financial number of (14) companies, and (4) companies were selected that met the conditions for selecting the study sample. The study methodology relies on the analytical method as it is more appropriate to the nature, scope and objectives of the study, and the ready-made statistical program "SPSS" will be used to analyze the relationships and influence between the
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MorePulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u
... Show MoreTransdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreThe aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
النظام السياسي في كوريا الشمالة