An abstract is a brief summary of a research article, thesis, Schiff base ligand (L) was prepared by the reaction of 4-aminantipyrine with o-phenylenediamine, the prepared ligand characterized by Micro elemental Analysis, FT. IR, UV-Vis, and 1H,13C-NMR spectroscopy.complexes of Mn(II), Co(II), Ni(II), Cu(II) and Hg(II) with Schiff base and 1,10-phenanthroline (Phen) have been investigated in aqueous ethanol with (1:1:1) (M:L:Phen). The prepared complexes were characterized using flame atomic absorption, (C. H. N) Analysis, FT. IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. From the obtained data the octahedral structure was suggested for all complexes. The biological screening effects o
... Show MoreABSTRACT:
Objectives: The study aims to know the effectiveness of the educational program in the patient’s adherence to medication and diet and to know the relationship between the effectiveness of the education program and their demographic data related to the patient’s age, gender, marital status, education level, occupation, monthly income and residence.
Methodology: A quasi -experimental design study was performed on patient who attended to Gastroenterology and Hepatology Teaching Hospital, from March 2021 to September 2021. The non-probability sampling including 50 patients for case study and 30 patients for control group. The questionnaire consists of 3 parts, part one the socio
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreThis study aims to clarify the role of Iraqi satellite channels in spreading negative values among university youth; and the tendency of this segment to simulate the descending behaviors and pseudo-peculiar concepts of our society, which are displayed through the screens of these channels, based on the relevant media literature such as scientific references and the results of previous studies and research.
The study followed the survey methodology to examine the public based on the questionnaire as a research tool, which was distributed to a sample of male and female students of Baghdad University enrolled in the university for the academic year 2011-2012.
In order to achieve the specific objectives of this research
... Show MoreBiomedical alloy 316L stainless steel enhancing to replace biological tissue or to help stabilize a biological structure, such as bone tissue, enhancing were coated with deposition a thin layer of silver nanoparticles as anti-bacterial materials by using DC- magnetron sputtering device. The morphology surface of The growth nanostructure under the influence of different working pressure were studied by atomic force microscope. The average grain size decrease but roughness of the silver thin layer was increased with‖ ―increasing the working pressure. The thickness of silver thin layer was increased from 107 nm at 0.08 mbar to 126 nm at 1.1 mbar. Antimicrobial activity of silver thin layers at different working pressure were studied. Th
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The imbalances and economic problems which it face the countries, it is a result of international economic developments or changes or global crises such as deterioration in trade, sharp changes in oil prices, increasing global indebtedness, sharp changes in foreign exchange rates and other changes, all that, they affect the economic features of any country. and These influences vary from one country to another according to the rigidity of its economy and its potential in maneuvering with economic plans and actions that would reduce the impact or avoidance with minimal damage. Therefore, the countries that suffer from accumulated economic problems as a result of mismanagement and poor planning or suffe
... Show MoreThis research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),
... Show More