There are many developments in political, strategic aspects in the middle east either in
international field which represented by U.S.A as first polar in world or territorial field which
represent by Turkey and Iran, as territorial powers in the region, Turkish role is fit with
American position in order to draw new map of middle east, Turkey advocate new policy to
confirm its attitude in Euro peen Union and its relation with U.S.A.
Iran adopted policy of Expansion in Iraq, Yamen, Lebanon and Syria, in addition Iran
enlist all it efforts to develop its Nuclear program and enter Nuclear club which make Iran,
Super power in middle east and the world, each Turkey and Iran have certain attitudes toward
all political changes in middle east and employ changes for their interests.
SYNTHESIS AND CHARACTERISATION OF NEWCo(II), Zn(II) AND Cd(II) COMPLEXES DERIVED FROM OXADIAZOLE LIGAND AND 1,10-PHENANTHROLINE AS Co-LIGAND
Semi-empirical methods were applied for calculating the vibration frequencies and IR absorption intensities for normal coordinates of the {mono (C56H28), di (C84H28), tri (C112H28) and tetra (C140H28)} -rings layer for (7,7) armchair single wall carbon nanotube at their equilibrium geometries which were all found to have D7d symmetry point group.
Assignment of the modes of vibration (3N-6) was done depending on the pictures of their modes by applying (Gaussian 03) program. Comparison of the vibration frequencies of (mono, di, tri and tetra) rings layer which are active in IR, and inactive in Ramman spectra. For C-H stretching vibrat
... Show MoreComplexes of Co(II),Ni(II),Cu(II)and Zn(II) with mixed ligand of 4 tributylphosphine (PBu3) were prepared in aqueous ethanol with (1:2:2) (M:L:PBu3)The prepared
The emergence of mixed matrix membranes (MMMs) or nanocomposite membranes embedded with inorganic nanoparticles (NPs) has opened up a possibility for developing different polymeric membranes with improved physicochemical properties, mechanical properties and performance for resolving environmental and energy-effective water purification. This paper presents an overview of the effects of different hydrophilic nanomaterials, including mineral nanomaterials (e.g., silicon dioxide (SiO2) and zeolite), metals oxide (e.g., copper oxide (CuO), zirconium dioxide (ZrO2), zinc oxide (ZnO), antimony tin oxide (ATO), iron (III) oxide (Fe2O3) and tungsten oxide (WOX)), two-dimensional transition (e.g., MXene), metal–organic framework (MOFs), c
... Show MoreA new Macrocyclic Schiff base ligand Bis[4-hydroxy(1,2-ethylene-dioxidebenzylidene) pheylenediamine] [H2L] and its complexes with (Co(II) , Ni(II) , Cu(II) , Zn(II) and Cd(II)) are reported . The ligand was prepared in two steps,in the first step a solution of (o-phenylene diamine) in methanol react under reflux with (2,4-dihydroxybenzylaldeyed) to give an (intermediatecompound) [Bis-1,2 (2,4-dihydroxybenzylediene)pheylinediamine] which react in the second step with (1,2- dichloro ethane) giving the mentioned ligand.Then the complexes were synthesis of adding of corresponding metal salts to the solution of the ligand in methanol under reflux with 1:1 metal to ligand ratio. On the basis of, molar conductance, I.R., UV-Vis, chloride content a
... Show MoreThe study aims to follow modern methods in teaching rhythmic gymnastics skills by directing learners to develop their perceptions and absorb what the world deals with today and develop intelligence among learners, the researchers searched for the strengths of the learner by providing them with an opportunity to form their kinetic formation, hence the problem came by introducing a method of self-intelligence and social to guide the learner in the search for ways and solutions to overcome boredom and economy Time and effort in the educational process in learning and give them the freedom to express their ideas And their skills and here came the role of social and self-intelligence to teach the individual and collective kinetic formati
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreThe study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show More