D-mannose sugar was used to prepare [benzoic acid 6-formyl-2, 2-dimethyl-tetrahydrofuro [3, 4-d][1, 3] dioxol-4-yl ester](compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption AA,(FT-IR),(UV-Vis), TLC, ES mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol),(metal: ligand: 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2 [M2 (L)(HA) 2] where M= Co (II), Ni (II), Cu (II) and Cd (II). These complexes were characterized by elemental analyses [(CHN) and (AA)],(FTIR),(UV-Vis.), molar conductance, 1H, 13C-NMR, TLC and magnetic moment measurements. From the above data the proposed geometry about Co (II), Ni (II), Cu (II) and Cd (II), is tetrahedral structure. Biological activity of the lignd and its complexes was carried out on staphylococcus aureu, bacillus subtilis escherichia coli and psedomonas aeruginosa.
The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me
... Show MoreA particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreAudio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
Jamal Basha: His Administrative and Political Effort in Baghdad