A new mixed ligand complexes were prepared by reaction of quinoline -2-carboxylic acid (L1) and 4,4?dimethyl-2,2?-bipyridyl (L2) with V(IV),Cr(III), Rh(III), Cd(II) and Pt(IV) ions. These complexes were isolated and characterized by (FT-IR) and (UV-Vis) spectroscopy, elemental analysis, flame atomic absorption technique, thermogravimetric analysis, in addition to magnetic susceptibility and conductivity measurements. Most complexes were mononuclear and with octahedral geometry, except Cd (II) with tetrahedral geometry, and V (IV) with square pyramidal geometry. A theoretical treatment of the ligands and the prepared complexes in gas phase was done using two programs Hyperchem.8 and Gaussian program (GaussView Currently Available Versions (5.0.9) along with Gaussian 09 which is the latest in the Gaussian series of programs).
English is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.
This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021. The material tested is six connective words which represent the commonest ones in every-day co
... Show MoreBackground: The menopause is physiological changes in women that give rise to adaptive changes at both systemic and oral level. During menopause, ovarian function declines and the production of sex steroid hormones reduces significantly affecting the oral tissues and periodontal structures leading to chronic inflammation of the gingiva, increased risk of tooth loss. Aim of study: The present study was designed to estimate the oral hygiene status in relation to salivary estradiol level among pre and post-menopausal women. Materials and Methods: Ninety women aged 48-52 years old, the control group consisted of 45 pre-menopausal women and the study group consisted of 45 post-menopause were examined for gingival index, plaque index and calcu
... Show MoreThe Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreKE Sharquie, AA Noaimi, MA Al-Shukri, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 3
The study investigates the relationship between the volatility of the Iraqi Stock Exchange Index (ISX), and the volatility of global oil prices benchmarks, Brent and West Intermediate Texas (WTI), in additional to the Iraqi Oil, Basra Crude Light (BSL) which represents the most exported Iraqi oil and the major influential factor on the Iraqi governmental revenues. Using monthly data covering the period: 1/2005-12/1205, econometrical and technical tools represented by Co-incretion, Vector Error Correction Model – VECM, Granger Causality, and Bollinger band were employed in order to explore the relationship between the variables.
The econometric analysis revealed the impact of the oil prices volatility on
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe present research tackles a number of historical facts and incidents with a purely legal dimension in an important stage in the contemporary history of Iraq, especially the era of the British occupation. This resulted in innumerable social, political and legal problems, particularily the judicial legislation problems in Iraq. These legislations included a set of civil laws and in force governmental procedures that will be discussed historically by examining documents issued by the Ministries of Justice and Interior Affairs in the governments of monarchy for the period from 1921-to-1958. The data of the present paper relied on the Iraqi Library and Archives, (hence DKW). The study adopted the narrative historical methodology when inves
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreBackground: A Catheter-associated with candidiasis infection is the most common nosocomial infection and the objective of this work is to isolate and identify Candida species from catheterized patients by ordinary culture and PCR.Objective:To study the isolation and identification of Candida species from catheterized patients by culture media and polymerase chain reaction(PCR).Methods: One hundred and thirty five Candida species isolates were obtained from urine culture of catheterized specimens from male and female patients , During the period between October 2011 to April 2012 , attending AL-Ramadi general teaching Hospital. A quantitative urine culture for isolation and identification of Candida species was. The isolation of Candida s
... Show More