The new Schiff base (L) “4‐[(2,4‐dimethoxy‐benzylidene)‐amino]‐1,5‐dimethyl‐2‐phenyl‐1,2‐dihydro‐pyrazol‐3‐one” was synthesized from 2,4‐dimethoxy‐benzaldehyde and 4‐amino‐1,5‐dimethyl‐2‐phenyl‐1,2‐dihydropyrazol‐3‐one, and the geometry of Schiff base was characterized and determined by proton nuclear magnetic resonance (1H‐NMR), mass, Fourier transform infrared (FT‐IR), and ultraviolet‐visible (UV‐vis) spectroscopy. Schiff complexes of Ni(II), Pd(II), Pt(IV), Zn(II), Cd(II), and Mg(II) have been prepared by reaction of ion metals with as‐prepared Schiff base. The results showed that synthesized complexes offered 1:2 metal‐ligand ratios. Furthermore, the Schiff complexes were a tetrahedral in complexes Ni(II), Zn(II), Cd(II), and Hg(II), octahedral Pt(II), and square planer complex Pd(II). Additionally, density functional theory (DFT) was applied for calculations of both spectroscopic properties and electronic structure of prepared Schiff bases. Moreover, the Schiff base and its metal complexes have been verified in vitro against
Soil is a crucial component of environment. Total soil analysis may give information about possible enrichment of the soil with heavy metals. Heavy metals, potentially contaminate soils, may have been dumped on the ground. chromium, nickel and cadmium,
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
AW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
The aim of the current study was to evaluate the knowledge and perception of the fifth stage pharmacy students (college of pharmacy/ University of Baghdad /Iraq) regarding generic medicines. This study is a cross-sectional study carried in a college of pharmacy /University of Baghdad during the period from (November 2018- March 2019). The number of students included in the current study was 168 undergraduate stager pharmacists. A questionnaire was used to collect data of the study. Nearly 86% of the students said that they had heard of generic and brand medicines, and pharmacy was the main source of knowledge regarding generic medicines (66.7%). About (33.3%) of the respondents agreed that generic medicines are bioequivalent to br
... Show MoreThis research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows
... Show MoreThe characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if