Some coordination complexes of Co(??), Ni(??), Cu(??), Cd(??) and Hg(??) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(??) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (??) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahedral structures
... Show MoreSome coordination complexes of Co(??), Ni(??), Cu(??), Cd(??) and Hg(??) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(??) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (??) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahedral st
... Show MoreThe research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arith
... Show Moreيعتقد البعض ان مفهوم العلم يعني الآلات والاجهزة العلمية (تقنيات التعليم) وهي لا تختلف عن مفهوم تكنولوجيا المعلومات , ويعد هذا الاعتقاد خاطئ , لان العلم هو بناء المعرفة العلمية المنظمة والتي يتم التوصل اليها عن طريق البحث العلمي , اما تكنولوجيا المعلومات فهي "التطبيقات العملية للمعرفة العلمية في مختلف المجالات ذات الفائدة المباشرة بحياة الانسان, او هي النواحي التطبيقية للعلم وما يرتبط بها من آلات واجهزة".
The organization of sporting activities at the local and international levels requires a lot of money, which has increased interest in marketing in the sports field, as it is one of the modern topics that represent the basic knowledge needed by the sports marketer and which represents one of the basic concepts to enhance the benefits and returns of sports clubs. The research problem was the weak awareness of the members of the administrative body of Iraqi sports clubs of the role of sports marketing in the dimensions of competitive superiority and not exploiting them in the optimal way that enables clubs to achieve competitive superiority. The research aims to know the role of sports marketing in competitive superi
... Show MoreThe importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading role of organizations in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul. .
After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More