A Ligand (ECA) methyl 2-((1-cyano-2-ethoxy-2-oxoethyl)diazenyl)benzoate with metals of (Co2+, Ni2+, Cu2+) were prepared and characterization using H-NMR, atomic absorption spectroscopy, ultra violet (UV) visible, magnetic moments measurements, bioactivity, and Molar conductivity measurements in soluble ethanol. Complexes have been prepared using a general formula which was suggested as [M (ECA)2] Cl2, where M = (Cobalt(II), Nickel(II) and Copper(II), the geometry shape of the complexes is octahedral.
Metal complexes chrome(III), manganese(II), iron(III), cobalt(II), nickel(II), cupper(II) and zinc(II) with diazonium of 3-amino-2-chloropyridine of general formula [2-Cl-C5H3N≡N]n[MXm], where n=2 or 3 for divalent and trivalent metal, m= 4 or 6 were synthesized. The complexes have been characterized by flame atomic absorption, (C.H.N), molar conductance, magnetic susceptibility UV-vis spectra, infrared spectra,1H-NMR spectroscopy and thermo gravimetric analysis (TGA and DTA). The measurements showed that the divalent metal ion complexes (M2+) have (1:2) M:L ratio with tetrahedral geometry around metal ions while the trivalent metal ions (M3+) formed (1:3) m
... Show MoreA new novel series of metalcomplexes are prepared from reactions between 2-benzoylthio- benzimidazole (L) with metal salts of Co (II) , Fe(III) and Rh (III) , while Pd(II) complex was obtained by mixing ligandsof 2-benzoylthiobenzimidazole (L) as primary ligand and bipyridine (L/)as secondary ligand as well as palladium chloride as metal salt in an ethanoic medium. The geometry of these compounds were identified using C.H.N.microanalysis, Ultraviolet–visible, Fourier transforms infrared, magnetic susceptibility, molar conductivity and flame atomic absorption (A.A). From the dataobtained by these spectral analyses, the molecular structures for Rh and Fe complexes were proposed to be octahedral geometry. A square planar const
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
A new series of Sulfamethoxazole derivatives was prepared and examined for antifibrinolytic and antimicrobial activities. Sulfamethoxazole derivatives bear heterocyclic moieties such as 1,3,4-thiadiazine {3}, pyrazolidine-3,5-diol {4} 6-hydroxy-1,3,4-thiadiazinane-2-thione {5} and [(3-methyl-5-oxo-4,5-dihydro-1H-pyrazol-4-yl)diazenyl] {8}. Their structures were elucidated by spectral methods (FT-IR, H1-NMR). Physical properties are also determined for all compound derivatives. Recently prepared compounds were tested for their antimicrobial activity in the laboratory. Each screened compound showed good tendency to moderate antimicrobial activity.
The research aims to improve the effectiveness of internal control system according to a model COSO, by identifying the availability of system components according to the model and then improve the effectiveness of each component by focusing on areas for improvement in each component, as it was addressed to a model COSO and then Maamth with the environment, the current Iraqi by introducing some improvements on the form of some mechanisms of corporate governance of the Council of Directors, and senior management, the Audit Committee, Committee appointments, especially that supplies application available in the laws and legislation, the current Iraqi, taking into consideration to make some
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreAfter the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MoreThe main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.