In this study, depleted uranium concentrations were calculated in sediments Diyala River samples , where 14 samples of sediment along the Diyala River were collected , starting from the Rustumiya area and ending with the Tuwaitha area after its confluence with the River Tigris , using the solid - state nuclear track detectors technique (SSNTDs). We found that the highest concentration of depleted uranium was in the sample (A-13), and was taken from the Tuwaitha area with the specific activity of the amount (78.1 ± 8.5 Bq/kg ) and the lowest concentration of the depleted uranium was in the sample (A-7), and was taken from the Azwaip area with the specific activity of the amount (46.3 ± 8.2 Bq/kg ) and the average up to (61.13 ± 5.26 Bq/kg ). The results showed that the average hazard index of these samples was up to (0.341) which is the limit being less than 1 and converged with what is recorded in some international organizations such as the (WHO) and (EPA). The results also show that external effective dose average was around (0.0325 mSv/y) and the internal effective dose average was around (0.182 mSv/y) .
New Schiff base ligand (E)-6-(2-(4-(dimethylamino)benzylideneamino)-2-(4-hydroxyphenyl)acetamido)-3,3- dimethyl-7-oxo-4-thia-1- azabicyclo[3.2.0]heptane-2-carboxylic acid = (HL) was synthesized via condensation of Amoxicillin and 4(dimethylamino)benzaldehyde in methanol. Figure -1 Polydentate mixed ligand complexes were obtained from 1:1:2 molar ratio reactions with metal ions and HL, 2NA on reaction with MCl2 .nH2O salt yields complexes corresponding to the formulas [M(L)(NA)2Cl],where M=Fe(II),Co(II),Ni(II),Cu(II),and Zn(II), A=nicotinamide .
In :the _pr sent _paper we report ths. ynthesis ·of a new li:ga!!d..
[f4LJ [{'2 {1-'[(2-hyd•:0xy-.ben:zy1i.den·e)..,bxcJrazanci}:etby-l }benzerieÂ
J,5 t;rtiol .aad its complexes ·w-ith '('Mlif(1 J Fev 1 ), ed(J'l), and. :f.::I:g 01>-)
The ligand \VS preP..ated rin tWo steps' • fp I t}Je nrst stea -soJutiQil Qf
-saUcyla[deeyeq. ip methatt:oJ . re3ctcd lU1der reflux
... Show MoreThe effect of thickness variation on some physical properties of hematite α-Fe2O3 thin films was investigated. An Fe2O3 bulk in the form of pellet was prepared by cold pressing of Fe2O3 powder with subsequent sintering at 800 . Thin films with various thicknesses were obtained on glass substrates by pulsed laser deposition technique. The films properties were characterized by XRD, and FT-IR. The deposited iron oxide thin films showed a single hematite phase with polycrystalline rhombohedral crystal structure .The thickness of films were estimated by using spectrometer to be (185-232) nm. Using Debye Scherrerś formula, the average grain size for the samples was found to be (18-32) nm. Atomic force microscopy indicated that the films had
... Show MoreImage content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.
In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on ea
... Show MoreIn recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to
The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of
... Show MoreEight different Dichloro(bis{2-[1-(4-R-phenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})iron(II) compounds, 2–9, have been synthesised and characterised, where group R=CH3 (L2), OCH3 (L3), COOH (L4), F (L5), Cl (L6), CN (L7), H (L8) and CF3 (L9). The single crystal X-ray structure was determined for the L3 which was complemented with Density Functional Theory calculations for all complexes. The structure exhibits a distorted octahedral geometry, with the two triazole ligands coordinated to the iron centre positioned in the equatorial plane and the two chloro atoms in the axial positions. The values of the FeII/III redox couple, observed at ca. −0.3 V versus Fc/ Fc+ for complexes 2–9, varied over a very small potential range of 0.05 V.
... Show MoreThe three parameters distribution called modified weibull distribution (MWD) was introduced first by Sarhan and Zaindin (2009)[1]. In theis paper, we deal with interval estimation to estimate the parameters of modified weibull distribution based on singly type one censored data, using Maximum likelihood method and fisher information to obtain the estimates of the parameters for modified weibull distribution, after that applying this technique to asset of real data which taken for Leukemia disease in the hospital of central child teaching .