2,2'-(1-(3,4-bis(carboxydichloromethoxy)-5-oxo-2,5-dihydrofuran-2-yl)ethane-1,2-diyl)bis(oxy)bis(2,2-dichloroacetic acid) a derivative of L-ascorbic acid was prepared by reaction of L-ascorbic acid with trichloroacetic acid (1:4) ratio, in the presence of potassium hydroxide. A series of new metal complexes of this ligand were prepared by a reaction with the chlorides of Cd(II), Co(II), Ni(II), Cu(II) and Zn(II). The new ligand and its complexes were identified by C.H.N., IR, UV-visible spectra, Thermogravimetric analysis (TGA), as well as 1H, 13C-NMR and Mass spectra for ligand L. The complexes were also identified by molar conductance, atomic absorption, magnetic susceptibility and X-ray diffraction for Cu (II) complex. FT-IR spectra
... Show MoreBackground: The adenomatoid odontogenic tumor is a relatively rare benign epithelial odontogenic tumor. It contains both epithelial and mesenchymal components. Few cases presented as an extrafollicular lesion or involve the mandible or associated with other odontogenic lesions. This paper represents a rare case of an extrafollicular AOT. Case presentation: A 24-year-old female had a painless swelling on the right side of the lower jaw since one-month duration. Intraorally there was a well defined fluctuant-blue swelling in the right alveolar premolar region measuring 1×2 cm obliterating the right lower buccal vestibule. Grade II mobility in the vital 44 and 45 teeth were observed. Panoramic radiographs showed a well-defined pear shaped
... Show MoreDisease responses of eight wheat cultivars , Saber Beg. , Abu-Ghraib 3, Mexipak , Tamoz 2,Tamoz 3 , IPA 95 ,IPA 99 and Tahadi which were grown in four different sowing date , 25 th October , 19th September , 14th December and 8 January , to leaf rust disease caused by Puccinia recondita were investigated under natural infection conditions at the experimental farm , College of Agriculture , Abu-Ghraib, during the growing season of 1997-1998.Results of this study revealed that IPA 95, IPA 99 and Tahadi showed moderate resistant reaction, while Tamuz 3 was moderateley susceptable . Abu-Ghraib , Saber Beg, Tamuz 2 and Mexipak showed susceptible yeaction to the causal agent . The first sowing date was not suitable for disease progress in compars
... Show MoreThe study aims at studying and analyzing the subject of marketing vigilance as it is one of the modern approaches in the marketing field that can be used to face changes in the competitive and strategic environment and that represents quick reactions on the part of the institution to ensure its survival and distinctiveness other aims are: Consolidating the strength of the marketing organization and its success continuously, represented by changes in the market share, awareness of the institution's position in the market and its relations with competing tourism companies, diversification of tourism services, as well as an analysis of the competitive strategic position of tourism institutions for the purpose of conducting a r
... Show MoreIn this paper, the Mars orbital elements were calculated. These orbital elements—the major axis, the inclination (i), the longitude of the ascending node (W), the argument of the perigee (w), and the eccentricity (e)—are essential to knowing the size and shape of Mars' orbit. The quick basic program was used to calculate the orbital elements and distance of Mars from the Earth from 25/5/1950 over 10000 days. These were calculated using the empirical formula of Meeus, which depended on the Julian date, which slightly changed for 10000 days; Kepler's equation was solved to find Mars' position and its distance from the Sun. The ecliptic and equatorial coordinates of Mars were calculated. The distance between Mars and the center of the E
... Show MoreEmotion could be expressed through unimodal social behaviour’s or bimodal or it could be expressed through multimodal. This survey describes the background of facial emotion recognition and surveys the emotion recognition using visual modality. Some publicly available datasets are covered for performance evaluation. A summary of some of the research efforts to classify emotion using visual modality for the last five years from 2013 to 2018 is given in a tabular form.
In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc
... Show MoreIn this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc
... Show More<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt t
... Show More