Metal complexes chrome(III), manganese(II), iron(III), cobalt(II), nickel(II), cupper(II) and zinc(II) with diazonium of 3-amino-2-chloropyridine of general formula [2-Cl-C5H3N≡N]n[MXm], where n=2 or 3 for divalent and trivalent metal, m= 4 or 6 were synthesized. The complexes have been characterized by flame atomic absorption, (C.H.N), molar conductance, magnetic susceptibility UV-vis spectra, infrared spectra,1H-NMR spectroscopy and thermo gravimetric analysis (TGA and DTA). The measurements showed that the divalent metal ion complexes (M2+) have (1:2) M:L ratio with tetrahedral geometry around metal ions while the trivalent metal ions (M3+) formed (1:3) m
... Show More
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show MoreResearch summary
This research discloses the study of the methodology of one of the notables of the followers, which is: (Abi Mijlis Al-Basri), who had a clear impact on many commentators after him, especially in the field of interpretation by impact. This study included two topics:
The first: his biography and scientific
The second: his methodology in the traditional interpretation.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreSimplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth
... Show MoreTwo simple, rapid, and useful spectrophotometric methods were suggest or the determination of sulphadimidine sodium (SDMS) with and without using cloud point extraction technique in pure form and pharmaceutical preparation. The first method was based on diazotization of the Sulphdimidine Sodium drug by sodium nitrite at 5 ºC, followed by coupling with α –Naphthol in basic medium to form an orange colored product . The product was stabilized and its absorption was measured at 473 nm. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.03012 μg∙cm-1, the detection limit was 0.0277 μg∙ml-1, and the limit of Quantitation was 0.03605μg
... Show MoreCelery and coriander are vastly applied in modern medicine and traditionally because various medicinal and nutritional benefits depend on their medicinal characteristics. The study aimed to detect, isolate and compare extracts contents of phenolic acids (caffeic and p-coumaric acids) in ethyl acetate fraction of fresh and dry aerial parts of coriander (Coriandrum sativum L.) and celery (Apium graveolens L.) of the Apiaceae family. The extraction of these constituents was carried out by maceration method using 70% ethanol and fractionation was done by using petroleum ether, and ethyl acetate. The existence of caffeic and p-coumaric acids in aerial part extracts of two plants was identified by thin-layer chromatography (TLC) and high-
... Show MoreTo maintain a sustained competitive position in the contemporary environment of knowledge economy, organizations as an open social systems must have an ability to learn and know how to adapt to rapid changes in a proper fashion so that organizational objectives will be achieved efficiently and effectively. A multilevel approach is adopted proposing that organizational learning suffers from the lack of interest about the strategic competitive performance of the organization. This remains implicit almost in all models of organizational learning and there is little focus on how learning organizations achieve sustainable competitive advantage . A dynamic model that captures t
... Show More