This paper concerns is the preparation and characterization of a bidentate ligand [4-(5,5- dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl) benzene sulfonamide]. The ligand was prepared from fusing of sulfamethoxazole and dimedone at (140) ºC for half hour. The complex was prepared by refluxing the ligand with a bivalent cobalt ion using ethanol as a solvent. The prepared ligand and complex were identified using Spectroscopic methods. The proposed tetrahedral geometry around the metal ions studied were concluded from these measurements. Both molar ratio and continuous variation method were studied to determine metal to ligand ratio (M:L). The M to L ratio was found to be (1:1). The adsorption of cobalt complex was carried out
... Show MoreBackground: Maxillary canines are important aesthetically and functionally, but impacted canines are more difficult and time consuming to treat, the aim of this study is to investigate with multi-detector computed tomography the correlation between the bone density and the upper canine impaction. Material and method: A sample of Unilaterally impacted maxillary canines from 24 patients (19 female, 5 male) who were referred to accurately localize the impacted canines at al- Karkh general hospital were evaluated by a volumetric 3-d images by the multi-detector computed tomography to accurately measure the bone density of the maxillary cortical palate of the maxillary impacted canine side and compare it with the other side of the normally erupt
... Show MoreThe History of Multi Parties and its Effect on Political System in India
Harold Pinter was one of the most important dramatists in the modern and the
contemporary age. Pinter presented his own dramatic realm in which he turns the theatre into
a moral institution. He employed the elements of several schools of drama and manipulated
them in order to deliver his ethical messages emphasizing the necessity to regain and renew
the world's morality in order to face the political and social injustices committed against
humanity. His writings developed over more than fifty years in style, techniques and his
interests. However, his main concern was his social and political satire.
Technological superiority of the means of communication and media has allowed these methods to dominate and are replaced by alternative positon of traditional media. The internet with its advantages and benefits benefited in various areas of life, especially media and achieve what no previous technology could achieve and any technology what comes after it can't be isolated from the internet. Today, the internet is the cornerstone of communication and connection in the world and the most important means of public and personal communication at the same time. The interactive feature of the internet and the cancelation of space and time restrictions create a new media that allowed everyone to express what they wanted freely. The internet app
... Show MoreThis paper aims to deal with the understanding of the properties of the molecular gas hydrogen in the extragalactic spirals sample. It is critical to make observations of CO (J = 1-0) line emission for spiral galaxies, particularly those with an energetic nucleus. In the sample of spiral galaxies compiled, a carbon monoxide CO (1-0) emission line can be observed. This sample of galaxies' gas kinematics and star-forming should be analyzed statistically utilizing appropriate atomic gas HI, molecular gas H2, infrared (1μm-1000μm), visual (at λblue-optical=4400A0), and radio spectrum (at νradio=1.4 GHz and 5GHz) databases. STATISTICA is software that allows us to perform this statistical analysis. The presence of a high scale of s
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreContracting companies play a prominent role today in economic activity, due to their contribution to the implementation of major construction projects which together constitute the infrastructure of society. Most construction projects also suffer from exceeding the time and cost specified and planned for the completion of the project, and this comes for several reasons, including the work environment, country conditions, The method of managing project costs and the techniques used in its implementation Accordingly, the concepts of lean construction came, which help in addressing the causes of waste, both in time and cost, in addition to the fact that project management needs techniques that are useful in controlling the control and manag
... Show MoreThe current research aims to provide a conceptual and applied frame on the subject of multi- level analysis in the research of business administration. The research tries to address some of the problems that befall the preparation of research and studies at the Arab level and local level, where the unity of theory and measurement and analysis, as well as clarify the various types of conceptual constructs and give researchers the ability to distinguish different models related to the level of analysis. On the other hand, this research provides an example of
... Show More