In this work, new di-acid monomers 4, 4’-di-carboxillic-4â€-bromo-2â€, 6â€-dimethyl triphenylamine (Ma), 4, 4’- di-carboxylic -4â€-chloro-2â€, 6â€-dimethyl triphenylamine (Mb) and 4, 4’- di-carboxylic -2â€,4â€-dichloro-6â€-methyl triphenylamine (Mc) were synthesized by reaction of p-cyanobenzofluride with three different aromatic amines (4-bromo,2,6-dimethyl aniline, 4-chloro,2,6-dimethyl aniline and 2,4 dichloro, 6- methyl aniline ) via aromatic nucleophilc substitution method to form three di cyano intermediates 4, 4’-Dicyano-4â€-bromo-2â€, 6â€-dimethyl triphenylamine (Da), 4,
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MoreThis study aims at identifying the correlation between digital transformation and knowledge building in educational institutions, as well as finding the influence relationship between digital transformation and knowledge building in educational institutions and knowing the dimensions of digital transformation that have the most impact in improving the level of knowledge building, and by adopting the methodological descriptive analysis method in the Ministry of Education. Education and educational institutions in Baghdad. This research deals with digital transformation as an independent variable according to two dimensions (digital adaptability and digital readiness). Knowledge building was adopted as an approved variable using the s
... Show MoreA binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show MoreIn light of the intellectual and technological progress within the current developments of time, as well as the emergence of digital tools and means of display and communication, which had a major role in the shifts of the time of globalization in various commercial and economic fields, as well as areas of transferring the design image and its stages of development to customers and the convergence of views between the customer and the interior designer, which are the most important pillars of the design process As a whole, and accordingly, there is an urgent need for a process of intellectual balance between them through digital tools from the technical side and through social media from the intellectual side. Customer comments via socia
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show MoreSpeech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R
... Show MoreTrialeurodes irakensis sp. n. is describe and illustrated from Iraq. T.vaporariorurn (westwood)
is reported and for the first time for the Iraqi fauna. A ke to species of Trialeurodes found in
Iraq is presented.
The present work was done in an attempt to build systematic procedures for treating warts by 810 nm diode laser regarding dose parameters, application parameters and laser safety. The study was done in Al- Kindy Teaching Hospital in Baghdad, Iraq during the period from 1st October 2003 till 1st April 2004. Fifteen patients completed the treatment and they were followed for the period of 3 months. Recalcitrant and extensive warts were selected for the study. Patients were randomly divided into 3 groups to be treated by different laser powers 9, 12 and 15 W, power density of 286 W/cm2, 381W/cm2, 477 W/cm2 pulse duration of 0.2 s, interval of 0.2 s and repeated pulses were used. The mode of application was either circular or radial. Pain oc
... Show MoreNotes are given regarding new record species of the braconid parasite short note in Iraq. That is Apanteles angalcti it is found to parasitize early larval instaxs of Ectomyslois ceratontae, one of the most serious pests of pomegra- nate fruit.