In this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectroscopic methods. These studies revealed octahedral geometry about Co(III) complexes in which the co-ligands bound through the amine and the carboxylate groups. Molecular structure for the complexes have been optimised by CS Chem 3D Ultra Molecular Modelling and Analysis Program and supported six coordinate geometry.
Objectives: The main objective of this study is to examine the crucial role that Russian writers and intellectuals played in catalyzing the 1905 Revolution in Russia. Specifically, the study sought to analyze how their literary works, philosophical ideas, and political writings challenged Tsarist autocracy, depicted the suffering of the masses, and inspired opposition movements. The study aimed to highlight the defiant writings that contributed to the rise of political figures and the eventual overthrow of the repressive regime. Methods: The historical narrative and analytical methods were employed, conducting a comparative analysis of prominent works by renowned authors such as Tolstoy, Gorky, and Chekhov. This analysis focused on
... Show MoreReconstruction in Iraq requires coherent legitimate frameworks that are able to detail obligations, rights and responsibilities of the parties participating in reconstruction projects, regardless their type or delivery system.
Conditions of Contract can be considered an important component of these frameworks. This paper investigates flexibility and appropriateness of the application of Iraqi conditions of contract in reconstruction projects. These conditions were compared to FIDIC Conditions. The objective wasn't comparing individual clauses, but rather exploring the principles and philosophy laying behind each conditions, and to what extent each conditions care about realizing equity between main contract parties. Validity of applic
The amicus curiae is one of the judicial procedures adopted in many judicial and legal systems around the world, under which a person who is not a party to the case, and without having a personal and direct interest in it, intervenes to draw the court’s attention to many factual and legal aspects
This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett
... Show MoreIn this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
Reseach target the most important topic, is Activity and ProfitabilityIndictors Analysis for
Nationality and Iraqi Insurance Company, In order to stand on them ability to cover its risks
and explore the efficiency asset and its avialible resources using to determine them abilities to
profit generation from its insurance activity. The analysis was focus to examine their profit
and activity power, and test the significant differences aming them performance. Test 2
hypothese that is related and result it sign that the 2 company no has significant differences at
profitability and activity level. The research depend on coneclusion, recommended two
company to work at efficiency with cost element of insurance activity in or
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More