This paper presents the synthesis and study of some new mixed-ligand complexes containing nicotinamide(C6H7N2O) symbolized (NA) and phenylalanine (C9H11NO2)symbolized (pheH)] with some metal ions. The resulting products were found to be solid crystalline complexes which have been characterized by :Melting points, Solubility, Molar conductivity. determination the percentage of the metal in the complexes by flame(AAS), magnetic susceptipibility, Spectroscopic Method [FT-IR and UV-Vis]. The proposed structure of the complexes using program , chem office 3D(2006) . The general formula have been given for the prepared complexes : [M(NA)2(phe)]cl M(II): Mn(II) ,Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) & Hg(II)). NA = Nicotinamide= C6
... Show MoreThis paper presents the synthesis and study of some new mixed-liagnd complexes containing nicotinamide(C6H7N2O) symbolized (NA) and phenylalanine (C9H11NO2)symbolized (pheH)] with some metal ions. The resulting products were found to be solid crystalline complexes which have been characterized by :Melting points, Solubility, Molar conductivity. determination the percentage of the metal in the complexes by flame(AAS), magnetic susceptipibility, Spectroscopic Method [FT-IR and UV-Vis]. The proposed structure of the complexes using program , chem office 3D(2006) . The general formula have been given for the prepared complexes :[M(NA)2(phe)]cl M(II): Mn(II) ,Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) & Hg(II) . NA = Nicotinamide= C6H7N2O Phe -
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreHistoric centers are often subject to urban renewal without the prior knowledge of the extent of the cohesion and attachment to place of its inhabitants. Identifying the rates of cohesion and place attachment can help urban designers to avoid decisions that lead to clashes with the reality of the social groups inhabiting the neighborhoods of the historic center. So the research aimed to measure cohesion and place attachment in a methodological approach based on a psychological instrument conducted by previous studies .The measurements were applied through a questionnaire given to the residents of six elected neighborhoods forming the historic center of Al- Adhamiya.The research assumed the relative disparity rates of cohesion and place atta
... Show MoreThis research deals with the perceived and the imagined in the texts of Yusef Al-Sayegh, considering language as the most important source in literature and theatrical criticism, and given the importance of the subject, the researcher monitored many philosophical and psychological opinions and theories related to (the perceived and the imagined), and they were discussed and their compatibility with the Iraqi theatrical t As for the second chapter, where (the theoretical framework), it included two topics, and the first topic was about the concept of the perceived and the imagined, and the second topic was about Youssef Al-Sayegh and the structure of the theatrical text.
In the third chapter, where (research procedures), the research
Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreShaky Baghdad heavy crude oil 22 API is processed by distillation and solvent extraction. The purpose of distillation is to separate the light distillates (light fractions) which represent 35% of heavy crude oil, and to obtain the reduced crude oil. The heavy residue (9 API) is extracted with Iraqi light naphtha to get the deasphaltened oil (DAO), the extraction carried out with temperature range of 20-75 oC, solvent to oil ratio 5-15:1(ml:g) and a mixing time of 15 minutes. In general, results show that API of DAO increased twice the API of reduced crude oil while sulfur and metals content decreased 20% and 50% respectively. Deasphaltened oil produced from various operating conditions blended with the
... Show MoreObjective: The purpose of this study was to assess the effectiveness of Vibriophage Universiti Sains Malaysia 8 (VPUSM 8), a bacteriophage that destroys bacteria, in managing the proliferation of Vibrio cholerae, specifically the El Tor serotype, as an alternate therapeutic strategy. Methods: The study entailed subjecting water samples from Kelantan, Malaysia, to reproduce the natural circumstances that promote the growth of V. cholerae. Subsequently, the samples were contaminated with the V. cholerae O1 El Tor Inaba strain and treated using VPUSM 8. The study employed a controlled experimental design, wherein the samples were divided into three groups, each experiencing different treatment methods. Quantifying the number of colony-
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreWith the advent of the globalization, the rapid development in technology and the intensity of competition companies attemptto maintain competition advantages and retain customers. The traditional methods in managerial accounting become irrelevance to achieve the objectives of these companies especially with the rapid changes in modern manufacturing environment .Thus there is a need to new tools in accounting such as lean accounting, which is considered as a costing method that support creating value for the customer by costing the entire value stream, eliminating waste in the accounting process, reduced lead time, improved quality, lowered time delivery and increased available capacity. Using value stream focuses not only on the waste&n
... Show More