The aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(?).Where M(?) =
... Show MoreThe aim of the work is synthesis and characterization of bidentate ligand [dipotassium sodium7-((E)-2-(2-((Z)-1-carboxylatoethylideneamino)thiazol-4-yl)-2 (carboxylatemethoxyimino) acet amido)-8-oxo-3-vinyl-5- thia-1-azabicyclo[4.2.0] oct-2- ene-2- carboxylate] [Nak2L], from the reaction of cefixime with sodium pyruvet to produce the ligand [Nak2L], the reaction was carried out in methanol as a solvent under reflux. The prepared ligand [Nak2L] which was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [Nak2L] was used as a primary ligand while 8-hydroxy quinoline [Q] was used as a secondary ligand with metal ion M(Π).Where
... Show MoreObjective (s): To assess the QoL of children age from (8- lessthan13) years with acute lymphocytic leukemia undergoing chemotherapy and to find out the relationship between the QoL of children with acute lymphocytic leukemia and their illness history.
Methodology: A descriptive study included (40) children with acute lymphocytic leukemia who were ranged between (8 - less than 13 years) at the Hematology Center in Medical City for the period from 4th March 2021 to 1st September 2021. The sample was non-probability (purposive) sample of children (male and female). A questionnaire designed with 2 main parts was used. The first part focused on sociodemographic characterist
... Show MoreThis study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce
... Show MoreThe virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreA nano manganese dioxide (MnO2) was electrodeposited galvanostatically onto a carbon fiber (CF) surface using the simple method of anodic electrodeposition. The composite electrode was characterized by field emission scanning electron microscopy (FESEM), and X-ray diffraction (XRD). Very few studies investigated the efficiency of this electrode for heavy metals removal, especially chromium. The electrosorption properties of the nano MnO2/CF electrode were examined by removing Cr(VI) ions from aqueous solutions. NaCl concentration, pH, and cell voltage were studied and optimized using the Box-Behnken design (BDD) to investigate their effects and interactions on the electrosorption process. The results showed that the
... Show MoreIn the name of of Allah the Merciful
Research Summary
This rule is one of the common rules between the sciences of the principles of jurisprudence and the jurisprudence rules. It is originally a fundamental rule because it relates to one of the topics of the science of the principles of jurisprudence, which is ijtihad. The ruling on reversing his ijtihad is permissible or not (1), and for this reason Ibn Al-Subki titled it in his book Al-Ishbah wa Al-Nazaer by saying: “What invalidates the judge’s judgment and what does not invalidate it.” ([2]).
The importance of this rule comes from the need for it by the judge, the mufti and the imitator, for the judge needs it to know the matters in which the ruling base
... Show MoreThe Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show More