Some coordination complexes of Co(ІІ), Ni(ІІ), Cu(ІІ), Cd(ІІ) and Hg(ІІ) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(ІІ) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (ІІ) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahedral structures are suggested for these complexes. Antibacterial activity of the ligand [H4L] and its complexes are studied against (gram positive) and (gram negative) bacteria [Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Bacillus]. The proposed structure of the complexes using the program, Chem office (2006) and the general formula has been given for the prepared ligand complexes K2[M(H2L)2].
A recent study compared experimentally the hydraulic and thermal activity of twisted tape inserts for two types, metal foam twisted tape (MFTT) and traditional twisted tape (TTT), in a double pipe heat exchanger. The investigation goal of the innovatively designed MFTT is to enhance the heat transfer process, which provides a higher thermal enhancement factor over those of TTT under the same conditions. Heat transfer activity in terms of Nusselt number (
The current work is focused on the rock typing and flow unit classification for reservoir characterization in carbonate reservoir, a Yamama Reservoir in south of Iraq (Ratawi Field) has been selected, and the study is depending on the logs and cores data from five wells which penetrate Yamama formation. Yamama Reservoir was divided into twenty flow units and rock types, depending on the Microfacies and Electrofacies Character, the well logs pattern, Porosity–Water saturation relationship, flow zone indicator (FZI) method, capillary pressure analysis, and Porosity–Permeability relationship (R35) and cluster analysis method. Four rock types and groups have been identified in the Yamama formation de
Discrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show MoreMenopause is the lack of menstrual cycle for at least six months. Due to hormonal changes, the alternation of lipid profile as a risk factor related to heart disease increases during menopause . One hundred twenty Iraqi women, aged between 40-65 years, were selected for this study. They were divided into two groups: 60 premenopausal and 60 postmenopausal women, and then each group was further divided into two subgroups: 20 women with hyperthyroidism and 20 with hypothyroidism, as well as 20 healthy women as control group. Blood samples were collected to estimate hormonal parameter by enzyme linked immunosorbent assay (ELISA) and lipid profile using enzymatic technique. The results showed that alterations in lipid profile inc
... Show MoreColorectal cancer CRC is the third most commonly diagnosed cancer in males and the second in female, so it is a common and life-threatening disease serum of 48 males and 40 females suffering from CRC disease as group one (G1) without taking a chemotherapy dose, the same patients group tow (G2) after taking the first chemotherapy dose, while group three (G3) whose patients in (G1) and (G2) after second taking a chemotherapy dose. and group four (G4) consist of (30 males and 30 females) healthy Iraqi control. Results showed a significant increase in IL-17, IL-17RA and CEA in G1, while there was a significant decrease in vitamin D concentration in G1 than other groups, also there was positive (+ ve) significant correlation between IL-17 and CE
... Show MoreThe research aims at identifying the organizational performance of the kindergarten teachers and defines the educational environment of kindergarten children. To achieve the objectives of the research, the researcher adopted the organizational performance scale for (Saadi, 2016), which was applied to kindergarten teachers. The scale consists of (43) paragraphs, and has good reliability and validity, as the coefficient of reliability (84.0) in a retest method, and (87.0) using the formula Alpha Kronbach. Additionally, the researcher adopted the educational environment scale for (Radam, 2015); the scale consists of (66) paragraphs, and it enjoys a good reliability and validity, as the coefficient of reliability (89.0) method of reliability
... Show MoreBackground: Cluster of differentiation 14 (CD14) is a serum/cell surface glycoprotein; and it is a pattern recognition receptor. CD14 expressed on the surface of various cells, or it found soluble in saliva and other body fluids. It has been proposed that soluble CD14 (sCD14) may play a protective role by controlling Gram negative bacterial infections through its capacity to bind lipopolysaccharide. This study was conducted to assess the level of soluble CD14 in saliva of patients with different periodontal diseases and healthy subjects and determine its correlation with clinical periodontal parameters. Materials & Methods: A total of 80 subjects, age ranged (25-50) years old, divided into three main groups, group ? consisted of 45 chronic
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show More