Preferred Language
Articles
/
8xe0k5ABVTCNdQwCYY23
Synthesis and Characterization of Schiff Base Metal Complexes Derived from Trimethoprim and mixed ligands with 8-hydroxy quinolone and study biologically activity
...Show More Authors

Schiff base obtained from the reaction (Trimethoprim) with (sodiumpyruvate ) to produce the ligand [NaL], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [NaL] was characterized by FT-IR, UV-Vis spectroscopy, 1H,13C-NMR spectra, mass spectra, and melting point.A new mixed ligand complexes have been prepared between ( 8- hydroxyquinolone) and the ligand [NaL] withMn(II).Co(II),Ni(II),Cu(II), (Zn(II) ,(Cd(II)and Pd(II). All the complexes were characterized by spectroscopic methods (FT-IR, UV-Vis spectroscopy), chloride content and melting point ,molar conductance and magnetic susceptibility.These measure- ments showed octahedral geometry around(,Mn2+, Co2+, Ni2+, Cu2+, Zn2+ and Cd2+) ions and square planner around Pd2+ ion

Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Human Resources Accounting And its Reflection on Quality Cost
...Show More Authors

The development of human resources training programs can assist in agreat deal in creating products of high quality with quantitive advantage for the economicunit;through the sale of products by prices higher of the peer products price in the arket,or decreasing production costs which lead into increusing the unet  profits. for these reasons, the human resources have got great importance for their great role in  any economy,and they havestarled to consentrate on accounting these resource.From this point of view, this research has handied human resources accounting and their effect on quality costs.  In(MID-Refinery Company),quality costs are determined ,then we have larified the reality of training and development in the o

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Operations Rescheduling Strategies, Policies, and Methods: A Philosophic Approach
...Show More Authors

When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems,  it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Biochemical Cellular Archive
The relationship between helicobacter pylori infection and reproductive disorder
...Show More Authors

To determine the relationship between infertility and Helicobacter pylori infection, thirty-five infertile patients of ages (20-49) years have been investigated and compared with 10 apparently firtility individuals. All the studied groups were carried out to measure (ASA), (TNF-á), (IL-6), (anti-H.pylori IgA) and (anti-H.pyloriIgG) by Enzyme linked immunosorbent assay (ELISA) technique. The statistical analysis also demonstrated that there were a highly significant differences (P<0.01), when compared between studied group. Also, the statistical analysis demonstrated that there were a highly significant differences (P<0.01) when compare between infertility and fertility in Conc. of sperm. The percentage distribution of ASA in serum and seme

... Show More
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Contemporary Sculpture vision and concept: محمد عبد الحسين يوسف
...Show More Authors

The research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.

 

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
Illation for the Groups SL(2,112 ) and SL(2,132 )
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Computations for the groups SL(2,81) and SL(2,729)
...Show More Authors

For any group G, we define G/H (read” G mod H”) to be the set of left cosets of H in G and this set forms a group under the operation (a)(bH) = abH. The character table of rational representations study to gain the K( SL(2,81)) and K( SL(2, 729)) in this work.

View Publication
Scopus Clarivate Crossref