This paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).
The wastewater arising from pulp and paper mills is highly polluted and has to be treated before discharged into rivers. Coagulation-flocculation process using natural polymers has grown rapidly in wastewater treatment. In this work, the performance of alum and Polyaluminum Chloride (PACl) when used alone and when coupled with Fenugreek mucilage on the treatment of pulp and paper mill wastewater were studied. The experiments were carried out in jar tests with alum, PACl and Fenugreek mucilage dosages range of 50-2000 mg/L, rapid mixing at 200 rpm for 2 min, followed by slow mixing at 40 rpm for 15 min and settling time of 30 min. The effectiveness of Fenugreek mucilage was measured by the reduction of turbidity and Chemical Oxygen Demand
... Show MoreThis research was conducted to determine content levels of heavy metal pollution. Samples taken from Ishaqi River bank and adjacent agricultural soils area, in ten sites, distributed along 48 km of the Ishaqi River, north Baghdad. The evaluated metals were Zinc, Copper, Manganese, Iron, Cobalt, Nickel, Chromium, Cadmium, Vanadium and Lead. PH and Electric Conductivity (EC) were measured to evaluate the acidity and (EC). Results showed that most site were contaminated with metals evaluated. Among these metals, Zn, Mn, Fe and Ni were consistently higher in all the samples (both river bank and adjacent soil) followed by PB, CU, V, Cd, Co and Cr. The level concentrations of river bank were almost higher than that of adjacent soil. As will be re
... Show MoreAbstract
This paper presents mechanical and electrical design, and implementation process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi
... Show MoreComplexes of Co(II),Ni(II),Cu(II)and Zn(II) with mixed ligand of 4 tributylphosphine (PBu3) were prepared in aqueous ethanol with (1:2:2) (M:L:PBu3)The prepared
Abstract
This paper follows the growing interest and continuity of Islamic finance products worldwide, which has encouraged the formulation of financial institutions based on the concepts of Islamic Sharia in many countries of the world and is no longer limited to Islamic countries only, and Not exclusive to Muslims which is due to Islamic finance services and their ability to apply in non-Islamic societies, and perhaps what encouraged the development and progress of this industry Islamic history, which was attended by many different models With the development of trade's share between different countries as well as trips carried out by Muslims
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe study aims to know the role of governance in the consolidation of the principles of business ethics, through the application of the principles of governance and the dimensions of business ethics in the private sector. And knowledge of the validity of the hypothesis key of the current study according to which "increases the ethics of business organizations strength and coherence in the presence of the principles of governance" as it was distributed the questionnaire to a sample of a chairman and board members and managers department and heads of sections in some of the private banks. I have been using correlation analysis and regression testing (t) to see the moral differences and to find out the c
... Show More