This review covers recent progress in the synthesis of curcumin and the bioactivity of semisynthetic and synthetic analogs of curcumin. The review also shows how curcumin is a useful intermediate for the synthesis of more complex organic molecules; historical perspective; the process of preparing the metal complexes and characterization the produced complexes using various spectral and other techniques; shows the importance of curcumin and its derivatives for their potential applications in medical devices and broad-spectrum of medical application such as antibiotic ointment, alternative therapeutics, antifungal, and antibacterial activities
The increasing complexity of how humans interact with and process information has demonstrated significant advancements in Natural Language Processing (NLP), transitioning from task-specific architectures to generalized frameworks applicable across multiple tasks. Despite their success, challenges persist in specialized domains such as translation, where instruction tuning may prioritize fluency over accuracy. Against this backdrop, the present study conducts a comparative evaluation of ChatGPT-Plus and DeepSeek (R1) on a high-fidelity bilingual retrieval-and-translation task. A single standardize prompt directs each model to access the Arabic-language news section of the College of Medicine, University of Baghdad, retrieve the three most r
... Show More-
The subject of this research is the study of the formal alienation of contemporary English sculpture, by comparing the most important sculptors of the new contemporary generation. This research problem is to look for the important factors in the formation of the contemporary sculptural structure of the exotic, and what is the mechanism of formation and output of these forms. The research seeks to explore (Alienation in contemporary sculpture between the works of Anthony Caro and Tony Cragg) in a comparative study. The importance of the research is to identify the concept of alien forms in contemporary British sculpture, especially in the cases of Anthony Caro and Tony Cragg that this research is considered a know
The oil and gas industry relies heavily on IT innovations to manage business processes, but the exponential generation of data has led to concerns about processing big data, generating valuable insights, and making timely decisions. Many companies have adopted Big Data Analytics (BDA) solutions to address these challenges. However, determining the adoption of BDA solutions requires a thorough understanding of the contextual factors influencing these decisions. This research explores these factors using a new Technology-Organisation-Environment (TOE) framework, presenting technological, organisational, and environmental factors. The study used a Delphi research method and seven heterogeneous panelists from an Oman oil and gas company
... Show MoreThis research aims to identify the reality of teaching political science research methods curriculum, to observe practices, and differences in teaching and learning between the Arab and Western universities. Moreover, it focuses on the difficulties that face students' acquisition of the course skills. The research uses the course model of some Western and Arab universities as case study.
This research shows that the curriculum do not reach yet the final form as other political science curriculums, and its upcoming changes will reflect the needs of stakeholders. The best method to teach this curriculum is to use applied learning in groups, learning by doing, and finally problem-based learning approach. Using optimal assessment deep
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More