The research aims to find out the impact of cognitive strategies in the mathematical competence of the students of the fourth scientific in the preparatory mahmoudiyah in the Directorate General of The Education of Karkh 2. A post-test of the mathematical competence prepared by (Jassim, 2018) was applied to the sample of (65) students, distributed into two groups of (33) students as experimental group and (32) students as a control group. The results found there are significant differences between the experimental group and the control group in testing the mathematical competence of students for the experimental group.
New tetradentate Schiff base [H2L] namely [2,2׳ -(ethane-1,2- diylbis (azan-1-ylylidene) diacetic acid)] was prepared from condensation of ethylenediamine with glyoxylic acid in ethanol as a solvent in presence of drops of 48% HBr .The structure of ligand (H2L) was characterized by,F-IR, U.V-Vis.,1H-,13C-NMR, pectrophotometer,melting point and elemental microanalysis C.H.N. Metal complexes of the ligand (H2L) in general Molecular formula [M(L)(H2O)2], where M= Co(II), Ni(II), Cu(II), Mn(II) and Hg(II); L=(C6H8N2O4) were synthesized were characterized by, Atomic absorption, F-IR, U.V-Vis. spectra, molar conductivity and magnetic susceptibility.It was found that all the complexes showed octahedral geometries.And
... Show MoreYohimbine is actually confirmed in the United States to be utilized for erectile dysfunction; and recently such drug has become commonly used in body-building communities for its presumed lipolytic and sympathomimetic effects. But ingestion of such drug can bring about epileptic neurotoxic effects.
Many antiepileptic drugs can be utilized to counteract myoclonic seizure; furthermore, diazepam can be used to oppose such type of seizure; in addition, surrogate therapeutic options such as omega 3 may also be utilized.
In this study, twenty-four (24) mice of both sexes weighing 20-25g were randomly-allocated into 4 groups (6 animals each group) as follows: Group I-
... Show MoreThis work includes preparation of Az, Qz, and Tz derivatives from the reaction of Schiff base (Sb) derivative with anthranilic acid, chloroacetyl chloride, and sodium azide, as well as, the characterization via FT-IR, 1H-NMR, and 13CNMR. The anticorrosion inhibition of these compounds was studied and the measurements of carbon steel (CS) corrosion in sodium chloride solution 3.5% (blank) and inhibitor in solutions were calculated at a temperature range of 293-323 K by the technique of electrochemical polarization. In addition, some thermodynamic and kinetic activation parameters for inhibitor and blank solutions (Ea⋇, ΔH⋇, ΔS⋇, and ΔG⋇) were determined. The results showed high inhibition efficacy for all the prepared compounds,
... Show MoreThe electrical resistivity method is one of the geophysical methods for detecting weak subsurface zone. The 2D resistivity data were used to compare three electrode configurations, Wenner, Dipole-dipole, and Schlumberger, to detect weak subsurface zones along a profile south of Baghdad near the Bismayah pumping station. The results show many zones of low resistivity that may be weak zones. A dipole-dipole array is a large number of measurements and is more sensitive than others. The Wenner-Schlumberger array has a depth also higher than other arrays. Wenner array has higher signal strength than other arrays. Because it is more sensitive to horizontal and vertical structures, the dipole-dipole array is the optimum for mapping sub
... Show MoreIn this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C
... Show MoreA series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreThe effects of T-shaped fins on the improvement of phase change materials (PCM) melting are numerically investigated in vertical triple-tube storage containment. The PCM is held in the middle pipe of a triple-pipe heat exchanger while the heat transfer fluid flows through the internal and external pipes. The dimension effects of the T-shaped fins on the melting process of the PCM are investigated to determine the optimum case. Results indicate that while using T-shaped fins improves the melting performance of the PCM, the improvement potential is mainly governed by the fin’s body rather than the head. Hence, the proposed T-shaped fin did not noticeably improve melting at the bottom of the PCM domain; additionally, a flat fin is ad
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More