This paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
The new compounds synthesized by sequence reactions starting from a reaction of 4-hydroxybenzaldehyde with 1,5-dibromo pentane to produce dialdehyde)I( .Then compound )I( reacted with different aromatic amines to give schiff bases )IIIV(,thereafter added acetyl chloride to schiff bases to yield N-acyl derivatives)VVII(.While1,3-diazetine derivatives)VIII-X( were synthesized from the reaction of N-acyl derivatives with sodium azide.The reaction of thiourea with N-acyl compounds led to formation of thiourea derivatives (XI-XIII).Finally, the pyrimidine compounds )XIV-XVI( were synthesized by ring closure reaction of compounds(XIXIII) with diethyl malonate.The synthesized compounds were characterized by measurements of melting points,FTIR,1H-N
... Show MoreIraq has suffered since 1991 from international sanctions imposed on it by the dictatorial regime that existed at the time, invading Kuwait, which led to the decline of the status of Iraq and the isolation of international and regional (Arab) and clear Iraq as a strange entity living within its regional environment, after April 2003 did not change much In fact, there were no signs of détente before the Arab League summit in Baghdad in 2011, and the signs of a break in the stalemate in inter-relations over the past years have become evident. Disruption and refraction was not high (Islamic Republic of Iran, Turkey, Syrian Arab Republic, Hashemite Kingdom of Jordan, Saudi Arabia, Kuwait). Each side is governed by perceptions about Iraq, es
... Show More"1998 onwards, a span reporting 1000s of studies depicts the ever-increasing Schiff bases and their complexes applicability; this study genetically tests the research of the last 20 years. The variety of these molecules structural has made them obtainable for a so broad ambit for implementations of biological. They are eminent and because of this unique feature they find their position in the quantitative and qualitative calculation of metals in the aqueous medium. It demonstrated to be prominent catalysts and showed an enjoyable effect of fluorescence. Definitively, Schiff base fissures gotten situation of a unique during bio-experiments and in vitro to develop drugs with a large number of biological structures containing parasites
... Show MoreThe purified prepared compounds were identified through different methods of identification i.e, I.R, UV-vi^ble-spectroscopy in addition to (coloured tests) Calculation of the sum of OH groups. TLC techniques were also used to test the purity and the speed ofthe rate of flow (RF).
The experiment was conducted to evaluate and performance comparison for moldboard and disk plows in central of Iraq in 2011. Three factor were used in this study included Two types of plows included moldboard and disk plows which represented main plot , three forward speeds of the tillage was second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and three levels of soil moisture was third factor included 21 , 18 and 14 % to determined data actual plow depth , Practical productivity, Volume of disturbed soil, Field efficiency , Slippage percentage in silt clay loam soil with depth 22 cm were studied in the experiment Split – split plot design under randomized complete block design with three replications using
... Show MoreNimodipine (NMD) is a dihydropyridine calcium channel blocker useful for the prevention and treatment of delayed ischemic effects. It belongs to class ? drugs, which is characterized by low solubility and high permeability. This research aimed to prepare Nimodipine nanoparticles (NMD NPs) for the enhancement of solubility and dissolution rate. The formulation of nanoparticles was done by the solvent anti-solvent technique using either magnetic stirrer or bath sonicator for maintaining the motion of the antisolvent phase. Five different stabilizers were used to prepare NMD NPs( TPGS, Soluplus®, HPMC E5, PVP K90, and poloxamer 407). The selected formula F2, in which Soluplus
has been utilized as a stabilizer, has a par
... Show MoreThis paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreThe study aims to measure and evaluate the return and the risk formulas of Islamic finance of Jordan during the period (2000 – 2009) according of increasing importance of these banks in recent and coming years to face challenges to maximize returns and minimize risks through financing with Islamic formula to investigate of existence statistical significant relationship between returns and risking Islamic bank , has been use of financial other statistical measurement. Measuring return and risk of Islamic banks have not been widely considered ,except in few descriptive studies . The controversy among academic and professionals about hot to measure and evaluate a comprehe
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More