Binuclear metal complexes of the metal ions Fe (II), Co (II), Ni (II) and Cu (II) were synthesized by the reaction of these metal ions with the imine of benzidine (H2L) as a primary ligand and o-phenylenediammine (OPD) as a secondary ligand in a molar ratio of 2:2:1. The prepared complexes were characterized using CHN elemental analysis, FT-IR, UV-visible, molar conductivity, magnetic susceptibility and TGA-DTA thermogravimetric analysis. All the prepared complexes showed apparent stability and could be stored for months without any appreciable change. According to the results obtained by elemental and spectral analyses, a tetrahedral structure is suggested for all the prepared complexes, except for the copper complex which showed a square planar structure. The antimicrobial activities of these complexes were evaluated against Bacillus spp. (Gram-negative bacteria), Proteus spp. (Gram-positive bacteria) and Aspergillus niger (A. niger, a fungal species). The results showed that all the prepared complexes have no apparent effects on Bacillus spp. viability, whereas Proteus spp. and A. niger were affected significantly.
Chekhov is well known and perceived in Arab countries. His stories and plays are very popular. They translated it into Arabic by different translators from different languages of the world Many of his stories require new translation solutions to achieve partial, if not complete, equivalence. Chekhov's works are a very difficult subject to analyze and interpret, which is explained by the fact that Chekhov's collections are constantly republished in foreign languages. It is impossible to preserve in translation all the elements of the original text containing historical and national details but, of course, the reader should have the impression that they represent the historical and national situation. When translating, it makes sense to prese
... Show MoreZubair oilfield is an efficient contributor to the total Iraqi produced hydrocarbon. Drilling vertical wells as well as deviated and horizontal wells have been experiencing intractable challenges. Investigation of well data showed that the wellbore instability issues were the major challenges to drill in Zubair oilfield. These experienced borehole instability problems are attributed to the increase in the nonproductive time (NPT). This study can assist in managing an investment-drilling plan with less nonproductive time and more efficient well designing.
To achieve the study objectives, a one dimension geomechanical model (1D MEM) was constructed based on open hole log measurements, including Gamma-
... Show MoreAn optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination
... Show MoreDue to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to
... Show MoreThe current research is concerned with studying the decisive answers which are considered quick and conclusive. These answers can effectively interrupt the opponent's argument and close the dialogue.This research is concentrated on deliberative methodology focusing on the decisive answer's activity and ending them through several completing and argument sides. This research consists of an introduction and three parts, the current introduction is focused the light on the concept of decisive answers and its uses in literature and the scarce of speech, and how to consider it with one dialogue description,that dialogue constitute by ? The first part is concerned with those answers through the deliberative methodology and classifying decisive
... Show MoreThis paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis
This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show MoreThe extraction, study, and accurate interpretation of the morphology database of a basin are the basic blocks for building a valid geomorphological understanding of this basin. In this work, a new approach is presented which is to use three different GIS based methods to extract databases with specific geographical information and then use the concept of information intersection to make a realistic geomorphological perspective for the study area.
In the first method, data integration of remote sensing images from Google Map and SRTM DEM images were used to identify Horan basin borders.
In the second method, the principle of data integration was represented by extracting the quantitative values of the morphometric c
... Show MoreThis research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the re
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show More