The preparation, spectroscopic characterisation of complexes derived from the mixed ligands with CdII, ZnII and CoII metal ions with Schiff base, Dithiocarbamates (DTCs) and 8-Hydroxyquinoline are reported. The compounds that prepared have been defined via; chloride content, F.T-IR, UV-Vis 1H-NMR spectroscopy and C.H.N.S, as well as conductance and magnetic susceptibility.All data which collected from such methods specified complexes with 6 coordinates in solution and solid states. The biologicalactivity that is related to all the prepared compounds which were screened for their antimicrobial activitiesagainst (G+ and (G-)). The data that collected from biological activity indicate that complexes will have extra activity against such tested bacteria in comparison to that in free ligands.
Undoubtedly, Road Traffic Accidents (RTAs) are a major dilemma in term of mortality and morbidity facing the road users as well as the traffic and road authorities. Since 2002, the population in Iraq has increased by 49 percent and the number of vehicles by three folds. Consequently, these increases were unfortunately combined with rising the RTAs number, mortality and morbidity. Alongside the humanitarian tragedies, every year, there are considerable economic losses in Iraq lost due to the epidemic of RTAs. Given the necessity of understanding the contributory factors related to RTAs for the implementation by traffic and road authorities to improve the road safety, the necessity have been a rise for this research which focuses into
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreA collection of pictures of traditional Kurdish women's national clothing and contemporary clothing was collected. A visit was also made to the city of Sulaymaniyah and the city of Halabja to find out the foundations of traditional clothing for the Kurdish regions and the impact of contemporary fashion on traditional dress. Which represents the culture and regionalism and reflects the picturesque nature of northern Iraq, and in order to complete the study, the parametric measurements of the clothes were analyzed and the graphs of the dress and its accessories were re-drawn to understand and make a comparison between them to study the clear influences and changes and examine the possibility of benefiting from them in sewing contemporary f
... Show MoreCluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.
In this research, the program SEEP / W was used to compute the value of seepage through the homogenous and non-homogeneous earth dam with known dimensions. The results show that the relationship between the seepage and water height in upstream of the dam to its length for saturated soil was nonlinear when the dam is homogenous. For the non-homogeneous dam, the relationship was linear and the amount of seepage increase with the height of water in upstream to its length. Also the quantity of seepage was calculated using the method of (Fredlund and Xing, 1994) and (Van Genuchten, 1980) when the soil is saturated – unsaturated, the results referred to that the higher value of seepage when the soil is saturated and the lowe
... Show MoreRemote sensing is a source of up-to-date information. The present study relied on various approaches for gathering information, including descriptive, quantitative and quantitative analytical processes. Particularly, we conducted the analysis of the satellite data ETM + of the satellite Landsat7 and the digital models of Digital Elevation Model of SRTM using ArcGIS9.2. The model depends on primary mathematical equations and constitutes an essential base for GIS applications that rely on data, computer, and software, performing the processes of data entry, analysis and processing. This paper deals with the geomorphological characteristics of a selected study area in Kirkuk province. The cha
... Show MoreIncremental sheet forming (ISF) is a metal forming technology in which small incremental deformations determine the final shape. The sheet is deformed by a hemispherical tool that follows the required shape contour to deform the sheet into the desired geometry. In this study, single point incremental sheet forming (SPIF) has been implemented in dentistry to manufacture a denture plate using two types of stainless steel, 304 and 316L, with an initial thickness of 0.5mm and 0.8mm, respectively. Stainless steel was selected due to its biocompatibility and reasonable cost. A three-dimensional (3D) analysis procedure was conducted to evaluate the manufactured part's geometrical accuracy and thickness distribution. The obtained results confirm
... Show MoreOne of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show More