n this research, some thermophysical properties of ethylene glycol with water (H2O) and two solvent mixtures dimethylformamide/ water (DMF + H2O) were studied. The densities (ρ) and viscosities (η) of ethylene glycol in water and a mixed solvent dimethylformamide (DMF + H2O) were determined at 298.15 K, t and a range of concentrations from 0.1 to1.0 molar. The ρ and η values were subsequently used to calculate the thermodynamics of mixing including the apparent molar volume (ϕv), partial molar volume (ϕvo) at infinite dilution. The solute-solute interaction is presented by Sv results from the equation ∅_v=ϕ_v^o+S_v √m. The values of viscosity (B) coefficients and Falkenhagen coefficient(A) of the Jone-Dole equation and Gibbs free
... Show MoreObjective: To assess the functional outcome, time to union, shoulder pain, blood loss, operative time, iatrogenic radial nerve injury, hospitalization, and infection. Methodology: It is a prospective randomized study on 30 patients with mid-shaft humerus fracture according to AO classification (1.2A1, 2, 3 and 1,2B) with functioning radial nerve. They were randomly dividing into two groups. Group A were treated by a closed antegrade interlocking nail, and group B treated by open reduction and locked compression plate fixation. The follow-up was up to 6 months, including time to union, shoulder pain, intraoperative blood loss, operative time and iatrogenic radial nerve injury. Functional outcome was assessed by quick DASH score. Resu
... Show MoreSchiff base obtained from the reaction (Trimethoprim) with (sodiumpyruvate ) to produce the ligand [NaL], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [NaL] was characterized by FT-IR, UV-Vis spectroscopy, 1H,13C-NMR spectra, mass spectra, and melting point.A new mixed ligand complexes have been prepared between ( 8- hydroxyquinolone) and the ligand [NaL] withMn(II).Co(II),Ni(II),Cu(II), (Zn(II) ,(Cd(II)and Pd(II). All the complexes were characterized by spectroscopic methods (FT-IR, UV-Vis spectroscopy), chloride content and melting point ,molar conductance and magnetic susceptibility.These measure- ments showed octahedral geometry around(,Mn2+, Co2+, Ni2+, Cu2+, Zn2+ and Cd2+) ions and square pla
... Show MoreThe increase the rates of natural growth, urbanization and continuous migration, this has generated constant pressure and, as a result, the capital city of Baghdad faces a number of challenges related to its urban environment, including the challenge of acquiring real estate.
and this research examines the impact of these holdings, representing the main base from which the various projects originate Urban in all areas (economic, social, and recreational).
this leads us to the research problem of the obstacles that arise during the process of acquiring real estate to carry out development projects, and to achieve the objectives of research, namely (work to create a regulatory methodology
... Show MoreThe study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreNAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010