A comparison study was made for the reaction of triruthenium carbonyl Ru3(CO)12 with azoarene ArN=NAr . This reaction was monitored in two kinds of solvents , toluene , and n- octane , which yielded new triruthenium carbonyl complex Ru3(μ3-NAr)2(CO)9 . The reactions of azoarenes ArN=NAr with Ru3(CO)12 formed the following trinuclear compound of Ru3((μ3- NAr)2(CO)9 (Ar-C6H4Br-4) in law yield . In addition , to new isomers species of mononuclear cyclometallated of Ru(BrC6H4N-NC6H4NBr-4)2(CO)2 in different percentages . The mechanism of the reaction domenstrates that the formation of trinuclear bis arylimido complexes , and ortho metallated was , the result of cleavage of nitrogen –nitrogen bond . Monitoring this gave evidence that the reaction is preceded faster in presence of n-octane and slowly in presence of toluene . The proposed structure of bis –aryl imido tri-ruthenium complex was based on the results of instrumental analysis .
A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Green synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show MoreIn this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;
... Show MoreIn the present work a theoretical analysis depending on the new higher order . element in shear deformation theory for simply supported cross-ply laminated plate is developed. The new displacement field of the middle surface expanded as a combination of exponential and trigonometric function of thickness coordinate with the transverse displacement taken to be constant through the thickness. The governing equations are derived using Hamilton’s principle and solved using Navier solution method to obtain the deflection and stresses under uniform sinusoidal load. The effect of many design parameters such as number of laminates, aspect ratio and thickness ratio on static behavior of the laminated composite plate has been studied. The
... Show MoreThis article reveals the first record of the parasitoid wasp, Monodontomerus obscurus Westwood (Hymenoptera, Torymidae) from Iraq. A total of 27 specimens were emerged from mud nests of sphecoid wasp of Sceliphron sp. (Hymenoptera, Sphecidae), that collected from a wall at a residential garden in Dohuk province. A short morphological description is presented.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreBackground: Radioactive iodine-131 therapy is highly effective in treating patients with hyperthyroidism. An ablative dose is preferred by a number of endocrinologists, and, a fixed dose protocol seems to be better than a calculated dose in real practice.
Objective: To check for hypothyroidism in hyperthyroid patients one year after RAI therapy, comparing between the results of high ablative versus usual dosages of RAI-131.
Methods: This study included 174 hyperthyroid patients, 101 males and 73 females, divided into 2 groups, the first consisted of 162 patients given a usual fixed dose of RAI while the second consisted of 12 patients given a high fixed ablati
... Show MoreThe study aimed to highlight the reality of the functional pressures with its dimensions (role ambiguity, role conflict, role burden, glass ceiling, and discrimination in composition). The researchers also relied on the questionnaire as a essential tool for data collection. The field study was conducted at the University of Mohammed Khiedr - Biskra -, the study was conducted on the basis of the total survey, which included all the workers of the 6 faculties of Biskra University (523 female employees).
After the analyzing of the data using the version 21 of the statistical program Spss, The study reached a number of results, the most of them is the low level of the functiona
... Show MoreSome types of the fungus Aspergillus were isolated from some hospitals in the city of Baghdad (Imam Ali Hospital and Sadr General Hospital). The samples were taken by Transport media at a rate of three replicates of each place isolated from samples from different places within the hospital (waste, baths, the sick beds, corridors and room floors) for the purpose of isolating and diagnosing the fungus on the Czapeck Dox Agar media. It was noticed that the spread rate of fungus Aspergillus was 70% compared to other species that have emerged during the isolation process of the Sabouraud's Dextrose Agar media. The species A.niger (56.25%) was considered the most common type of fungus visible during the isolation process of the Imam Ali Hospit
... Show More