In this study, synthesised new ligand: potassium 2,2'-(quinoxaline-2,3- diyl)bis(1-phenylhydrazinecarbodithioate) (L). The ligand synthesised by reacting N1,N2-dip-tolyloxalamide as the starting material with CS2 and KOH to add the CS2 group and then with phenylendiammine to achieve (L). The ligand used in the synthesis of complexes with (CoII, NiII and CdII). The new ligand and its complexes characterised by FT-IR, UV-Vis, 1H, 13C-NMR, Mass spectroscopy, and elemental analysis, in addition to the above techniques were using magnetic moment, atomic absorption, chloride content, and melting point to describe the metal complexes.
Interested current Research measuring damage currency Swap by converting The ministry of higher Education and scientific Research money The Iraqi dinar To U.S dollar by Trade Bank Of Iraq , And that The damage Generated resulting from Deferent Between the Exchange Rate adopted From Central Bank of Iraq and Market Exchange Rate adopted by The Trade Bank Of Iraq , and Which led to the greet damage ( losses ) in Bearing by the ministry, which led to the reduction of the financial allocations for licensed curriculum outside of Iraq , and this in turn leads to reduction in the number of students Sender ( scholarships ) outside Iraq.
Where the estimated loss (damage) that suffer by the Ministry of H
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper studied kinetics of flotation of emulsified paraffine in water in bubble column with sodium .dodecylsulphate as a collector agent. The effects of oil drops and air bubble diameters on the flotation rate constant were studied. The removal rate for each oil drop size was first order with respect to oil drop concentration. An experimental procedure permitting determination of the first order rate constants for removal due to bubble/drop interaction was developed, decreasing bubble diameter by adding NaCl and increasing oil drop diameter increased the rate constants. A comparison between the experimental and theoretical rate constants showed
... Show MoreThis study has been performed to study the inhibitory effects of crude plant extracts of Bay (laurus nobilis) leaves against some bacterial isolates represented by Staphylococcus aureus, Staphylococcus epidermids, Proteus vulgaris, Bacillus subtilis, Escherichia coli, and Pseudomonas aeroginosa in vitro. The results showed that percentages of essential chemical of laurus nobilis leaves which represented by moisture, total oil, total ash, crude protein, crude fibers, carbohydrites and caloric values in dry weight are 5.96, 4.28, 14.2, 8.75, 24.8, 76.99%, and 284.92 kcal/100g respectively, the percentages of some major and minor mineral elements of laurus nobilis leaves powder which represented by Mg, Fe, Cu, Pb, Cd and As, are: 0.211, 0.1
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show More