Copper electrodeposition by electrorefining process in acidic sulfate media contains 40 g/l of cupric ions and 160 g/l of sulfuric acid was achieved to study the influence of the operating parameters on cathode purity, surface morphology, deposition rate, current efficiency and power consumption. These operating parameters and there ranges are: current density 200, 300 and 400 A/m2, electrolyte temperature 35, 50 and 65 oC, electrodes spacing 15, 30 and 45 mm and electrolyte residence time 6, 4 and 2 h were utilized. XRF, SEM and EDX analyses were attained to clarify the properties of the produced cathode.
The present article is devoted to the analysis of Arabic phraseological units with a component hand, selected by continuous sampling from the “Training Russian-Arabic phraseological dictionary: about 900 phraseological units” by G. L. Permyakov. Arabic phraseological units with a component hand are modeled as invariant situations (by logical-semiotic models) and figurative statements are expressed by phraseological variants (according to the figurative characteristic of the hand component). The artical focuses on the fact that somatism in Arabic phraseology has a symbolic and symbolic nature, marking various situations of Arabs' behavior, their actions, deeds, rituals, emotional and psychological states, etiquette, in
... Show More Reaction of Na2PdCl4 with benz-1,3-imidazole-2-thione or (bzimtH) benz-1,3-thiazoline2-thione (bztztH) in ethanol / NE3 afford complexes of the type [Pd(bzimt)2](1) and [Pd(bztzt)2](2) respectively. Treatment of [Pd(L)2] L= bzimt or bztzt with bidentate ligands (N^N) where N^N= bipyridine (Bipy) , phenanthroline (Phen) , ethylene diamine , or N,N′dimethylethylene diamine afford mononuclear complexes of the type [PdL2(N^N)]. The bzimt and bztzt ligands are coordinated as bidentate chelating ligands through the S and N in (1) and (2) whereas bonded as a monodentate fashion via the sulfur atom in other complexes. The prepared complexes were characterized by elemental CHN analysis, ir and 1H nmr spectra.
Introduction: Infection control or hospital-acquired infections are the major concern of the health care system and agencies. Critical care nurses are on the first-line contact with the patients, so on, they are most vulnerable to acquired infections. It is really important to regularly check their knowledge and practices concerning infection control. Objectives: The study aims to identify the impact of years’ experience on nurses’ knowledge and practices concerning infection control in three hospitals and center (Baghdad teaching hospital, Ibn Al-Nafees hospital, and Ibn al-Bitar center) Methodology: Cross-sectional study was conducted, the study starting from 4th of July 2020 to 13th of November 2020. Non-probability (purposive) sampl
... Show MoreNew tetradentate Schiff base [H2L] namely [2,2׳ -(ethane-1,2- diylbis (azan-1-ylylidene) diacetic acid)] was prepared from condensation of ethylenediamine with glyoxylic acid in ethanol as a solvent in presence of drops of 48% HBr .The structure of ligand (H2L) was characterized by,F-IR, U.V-Vis.,1H-,13C-NMR, pectrophotometer,melting point and elemental microanalysis C.H.N. Metal complexes of the ligand (H2L) in general Molecular formula [M(L)(H2O)2], where M= Co(II), Ni(II), Cu(II), Mn(II) and Hg(II); L=(C6H8N2O4) were synthesized were characterized by, Atomic absorption, F-IR, U.V-Vis. spectra, molar conductivity and magnetic susceptibility.It was found that all the complexes showed octahedral geometries.And
... Show MoreThe electrical resistivity method is one of the geophysical methods for detecting weak subsurface zone. The 2D resistivity data were used to compare three electrode configurations, Wenner, Dipole-dipole, and Schlumberger, to detect weak subsurface zones along a profile south of Baghdad near the Bismayah pumping station. The results show many zones of low resistivity that may be weak zones. A dipole-dipole array is a large number of measurements and is more sensitive than others. The Wenner-Schlumberger array has a depth also higher than other arrays. Wenner array has higher signal strength than other arrays. Because it is more sensitive to horizontal and vertical structures, the dipole-dipole array is the optimum for mapping sub
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More