In this work we prepared some schiff bases by condensation urea and benzaldehyde or its derevative ( bromo benzaldehyde or hydroxy benzaldehyde ) as ( 1 : 1 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A1 , B1 , C1 , D1 , E1 , F1 , G1 ) and ( 1 : 2 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A2 , B2 , C2 , D2 , E1 , F2 , G2 ) . The prepared compounds identified spectroscopic by infrared spectroscopy FT-IR and Thin layer chromotography T.L.C . The force constant calculated from the wave number for the carbonyl stretching from FT-IR chart and by using the following equation K = 4?2C2?'2? The change in double bond order for carbonyl deteremined in according with some past research by compare the force constant for the prepared compounds with the force constant in past research and calculated bond order statistically by extract the curve equation and calculated the bond order by application curve equation .
In light of today's business world, who faces challenges and intense competition as a result of the rapid evolution of technical and informational, organizations had to respond to variables through the adoption of modern management techniques that reduce the effects of risks and activating the role of the internal control system in order to contribute to the early detection of risks and reduce the negative results expected .The research is to address the problem faced by organizations which still follow the traditional methods in the control activities, and the lack of knowledge of the management and their staff of the importance of the existence of risk management and internal control system takes into account these risks, and the limit
... Show More
This study was conducted to determine the effect of different concentrations of ethanol extract of propolis against two fungi Botrytis cinerea, Altrnaria sp. The most important chemical constituents of propolis diagnosed by the Infra Red Spectroscopy, were the Flavonoids specificaly. Results showed a high antifungal activity of ethanol extract of propolis, evidently with a high concentration of extract (5) mg\ml, which completely inhibited the radial growth on both solid and liquid media (PDA &PD Broth ) of both fungi . We observed that , ethanol extract p
... Show MoreIn this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.
Background: Pain is one of the most postoperative complications of surgical wound especially within first 24 hrs. leading to delay hospital discharge, stress gastritis and increasing blood pressure. As wound infiltration with long acting local anesthetic (bupivacaine) has been proved to be effective after orthopedic surgeries especially total hip and knee replacements.Objective: our study was designed to determine theeffectiveness of local infiltration of 0.5% of bupivacainebefore closure of surgical wounds in controllingpostoperative pain and improve patient’s outcome after totalhip and knee replacement surgeries in first 24hrspostoperative period.Methods: Twenty patients from class I (healthy patients) and class II (patients mild sys
... Show Moreأن التطور العلمي الحاصل فيما يخص المجال الرياضي أرسى آفاق جديدة لمواكبة التطور الكبير في مجا ل الألعاب والفعاليات الرياضية المختلفة ,و أن تحقيق النتائج الجيدة في فعاليات العاب القوى بشكل عام والثلاثية بشكل خاص في التدريب الرياضي يتطلب إتباع الأساليب العلمية الدقيقة والموضوعية بشكل سليم ومخطط له،فضلا عنة تطبيق نظريات ومنحى جديد لمواكبة الاتجاهات الحديثة في تحقيق النتائج الجيدة للوصول إلى المستويات العالية
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show More