In this work we prepared some schiff bases by condensation urea and benzaldehyde or its derevative ( bromo benzaldehyde or hydroxy benzaldehyde ) as ( 1 : 1 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A1 , B1 , C1 , D1 , E1 , F1 , G1 ) and ( 1 : 2 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A2 , B2 , C2 , D2 , E1 , F2 , G2 ) . The prepared compounds identified spectroscopic by infrared spectroscopy FT-IR and Thin layer chromotography T.L.C . The force constant calculated from the wave number for the carbonyl stretching from FT-IR chart and by using the following equation K = 4?2C2?'2? The change in double bond order for carbonyl deteremined in according with some past research by compare the force constant for the prepared compounds with the force constant in past research and calculated bond order statistically by extract the curve equation and calculated the bond order by application curve equation .
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Praise be to God, who said: {And establish prayer and pay zakat and lend to God a good loan, and whatever good you put forward for yourselves you will find with God. It is better and greater in reward. Ask forgiveness of God. Indeed, God is Forgiving, Most Merciful. May blessings and peace be upon Muhammad, the servant of God, and His Messenger, may God bless him and grant him peace, who said: “Islam is built on five Testifying that there is no god but God and that Muhammad is the Messenger of God, establishing prayer, paying zakat, Hajj, and fasting Ramadan” ().
Now that follows: Islamic law aims to make man happy in this world and the afterlife, starting with faith in God Almighty until the end of the legal obligations. This is
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The adopted method in the teaching of history is conservation and indoctrination in all grades, and this will lead to a lack of students interact with teachers in the course of the lesson, and poor use of teachers to questions that raise students' thinking during the lesson, which leads to a lack of interest in the topic of the lesson and wasting opportunities contribution making it the teacher at the center of the educational process, and to provide arrogating the researcher to contribute to teaching style with the belief that the use of this method of teaching could lead to overcome the difficulties and problems faced by the teaching material.
And there are educational complexes integrated approac
... Show MoreThe article aims to study the liquidity that is required to be provided optimally and the profitability that is required to be achieved by the bank, and the impact of both of them on the value of the bank, and their effect of both liquidity and profitability on the value of the bank. Hence, the research problem emerged, which indicates the extent of the effect of liquidity and profitability on the value of the bank. The importance of the research stems from the main role that commercial banks play in the economy of a country. This requires the need to identify liquidity in a broad way and its most important components, and how to
... Show Moreأدى التغير السريع في البيئة الخارجية للمنظمة إلى ظهور حالة من التنافس الشديد مما زاد تخوف الشركات من فقدان الحصة السوقية والخسارة . مما حدا بالمنظمات إلى الاهتمام بوجود مدير يحمل صفات وخصائص قيادية لما فيه من ميزات في تنظيم الإنتاج ومقابلة الطلب وتقليل التكاليف وتطوير الأداء للحصول على ميزة تنافسية تحافظ او تزيد من حصتها السوقية وإرباحها .
تسعى الدراسة الى تحديد عدد من الاهداف كان اهمها معرفة الع
... Show MoreThis study has been carried out in the Station of Poultry Researches which is affiliated to the General Office of Agricultural Researches / Ministry of Agriculture during the period from 01/04/2018 to 14/05/2018 there are 300 one day old chick of type (Ross 308) used in this study, and has been fed on diets which green tea powder (Camellia sinensis) has been added to it with the levels 0.5 , 1 , 1.5 , 2 g/kg as a feed for the treatments T 2 , T 3 , T 4 and T 5 respectively and compared to the control treatment T 1 which is devoid of addition, every treatment included three replicates each one has 20 birds in order to study the effect of adding a various levels of green tea powder (Camellia sinensis) to the diet on the productive performance
... Show More