Four Co(II), (C1); Ni(II), (C2); Cu(II), (C3) and Zn(II), (C4) chelates have been synthesized with 1-(4-((2-amino- 5‑methoxy)diazenyl)phenyl)ethanone ligand (L). The produced compounds have been identified by using spectral studies, elemental analysis (C.H.N.O), conductivity and magnetic properties. The produced metal chelates were studied using molar ratio as well as sequences contrast types. Rate of concentration (1 ×10 4 - 3 ×10 4 Mol/L) sequence Beer’s law. Compound solutions have been noticed height molar absorptivity. The free of ligand and metal chelates had been applied as disperse dyes on cotton fabrics. Furthermore, the antibacterial activity of the produced compounds against various bacteria had been investigated. F
... Show More5-((2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)phenyl)diazenyl)quinolin-8-ol azo ligand (L) has been synthesized through the reaction of diazonium salt for 2,4-dibromo-6-((cyclohexyl(methyl)amino)methyl)aniline with 8-hydroxyquinoline. The azo ligand (L) was characterized utilizing spectroscopic techniques, including FTIR, UV-Vis, 1H and 13C NMR, as well as mass spectrometry and micro-elemental analysis (C.H.N). Metal complexes containing Co(II), Ni(II), Cu(II), and Zn(II) were synthesized and analyzed through mass spectrometry, flame atomic absorption, elemental analysis (C.H.N), infrared and UV-Vis spectroscopy, along with measurements of conductivity and magnetic properties. The experimental findings suggested that all met
... Show Morefacing economic units operating in the environment sector of the Iraqi
industrial many pressures in its seeking to measure and evaluate its performance because of variables, today's corporate environment, as the case which makes looking for a methodology can be adopted to evaluate its performance with a more holistic, rather than being limited to traditional measures that are no longer enough to keep pace with rapid changes in today's corporate environment, which requires that measures of performance are derived from the strategy of unity and commensurate with the specificity of the environment in Iraq. Try searching discussion Ttormwhrat and performance measurement systems to suit the business strategies and directions of change
... Show MoreBackground Bloodstream infection (BSI) is a life-threatening condition caused by the presence of microorganisms, generally caused by a range of bacteria in the blood. Objectives The aim of this study was to evaluate the possible role of procalcitonin (PCT) and C-reactive protein (CRP) as biomarkers of pediatric BSI. Methodology The study was conducted on 150 blood samples collected from the patient who admitted to Children Welfare Teaching Hospital, Medical City, Baghdad. During the period from November 2020 to March 2021, ninety blood samples from them were positive culture and 60 blood samples were negative culture (control group). The isolates were identified depending on the morphological, microscopic examination, and biochemical tests.
... Show Moren this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThis paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show More