The study includes preparation and characterisation of mixed azo-linked Schiff-base ligands and their complexes. The starting material was isolated from the mixing of 2-amino pyridine diazonium salt with 2-amino-phenole and 4-amino-3- hydroxy-1-naphthalene sulfonic acid respectively in 1:1 mole ratio in water. In this work, the formation of azo-linked Schiffbase ligands are reported. Ligands of the azo-linked Schiff-base was achieved by the reaction of starting material with 4- (dimethylamino) benzaldehyde) (HL1 and HL2). The complexes were prepared by mixing the azo-linked Schiff-base ligands with the metal salts; CoII, NiII and CdII in a 1:1:1 mole ratio. Ligands and complexes were characterised by analytical and spectroscopic analyses including; microanalysis, chloride content, thermal analysis, magnetic susceptibility for complexes, conductance, FTIR, UV-Vis and 1H-NMR spectroscopy. Physico-chemical techniques indicated complexes demonstrated six coordinate structures in the solid and solution sate. Biological activity of the ligands and their metal complexes were screened for their antimicrobial activity against four bacterial species (Escherichia coli and Enterobacter (G-)), (Bacillus stubtilis and Staphylococcus aureus (G+)).
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreAbstract The research investigates in detail the fascinating story of its title character, which may work as an allegory for Africa itself in its past. Ama Ata Aidoo is miscellaneous writers who wrote in different literary genre like drama , short stories novel and , poetry and criticism . She is also an active feminist. Aidoo is against the colonial practice and its influence on African minds. Aidoo's play Anowa confronts painful issues in Africa's past, mostly those of the slave trade. She goes further to tackle issues of patriarchal domination and African feminism, like the relationships between individuals and society, women and motherhood, men and women, husbands and wives, mothers and daughters, and above all the future invasion
... Show MoreThe new events in every era are endless, and it is not required of the legal texts to pursue each event by itself and attach to it its ruling.
At the same time, every event or action must have a Shari’a ruling according to the wise Lawgiver, and our scholars have noted this in every event presented to them. ...etc.
It is well known that reaching the legal ruling on a matter, by examining the detailed evidence, is subject to following the path of the rules and regulations specific to the overall evidence, which we organize on the basis of the principles of jurisprudence.
Therefore, any disagreement about the manner or content of these rules will have an impact on the difference of jurists in partial issues, when examining the d
The purpose of this study is to explore whether the adoption of Beyond Budgeting (BB) as a management accounting practice (MAP) contributes to developing intellectual capital (IC) and creating value in Iraqi companies. This requires an understanding of the views of the Iraqi managers about the nature of the information provided by this practice, which may be used to determine whether this information is relevant in the management of IC in the context of Iraq. This research aims also to explore the challenges of the adoption of the BB in planning and controlling IC in Iraq. The study adopts a qualitative approach and an interpretive paradigm. It also adopts a semi-structured interview method of collecting data from executive managers
... Show MoreIn light of the enquiry raised by the Economist Mary Finn in 1995 concluding that high utilization in absorptive capacity of the economy is of inflationary tendency for industrial countries due to the equality between high rates of utilization of absorptive capacity and resource – shortage conditions leading to price inflation, the same idea was used to prove that budget utilization of operational costs and elevating absorptive capacity at the expense of investment budget leads to inflationary tendency that becomes a burden on financing the step- in policy of the Central bank to control prices through its foreign currency reserves at a time when the economy turned into an importer of non- tradable goods and being subject
... Show MorePregnancy is a stressful condition in which many physiological and metabolic functions are altered to a considerable extent . Pregnancy is a physiological state accompanied by a high-energy demand and an increased oxygen requirement. The present study aim to study selenium ,zinc cupper in the first trimester of pregnancy. The study group comprised of Fourty five pregnant women and twenty six non pregnant women as control . The samples were taken from pregnant women who come to several heath center in Baghdad city to cheak up. Laboratory investigations including Cupper, Ceruloplasmin, Total Antioxidant (TAA), malondialdehyde (MDA), glutathione (GSH), Zinc, Uric acid, and Selenium had been measured in pregnant women and control . Th
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreHuman cytomegalovirus (HCMV) has a worldwide distribution and extremely common infections. The presence of HCMV genome and antigens has been detected in many kinds of human cancers especially breast cancer. In Iraq, the incidence of breast cancer generally exceeds any other type of malignancies among Iraqi population. The study was performed in the period between October 2016 and June 2017 in Central public health laboratory/Baghdad. It involve samples from 90 women including 60 breast cancer patients, 20 benign tumor patients, and 10 normal breast tissues. A blood sample was obtained from each woman included in this study. Anti-HCMV IgG antibody was presented in 9/10 (90%) of normal women, benign breast tumor patients 19/20 (95%) and malig
... Show MoreIn this study abundance and composition of zooplanktons in the Indus River Estuary was conducted to examine habitat characteristics and its impact on tiny organisms. Overall 30,656 individuals were identified and segregated into seven major groups including Copepods, Cnidarians, Decapods, Mollusk, Pisces, Amphipods and Chaetognaths. For better understanding they were further divided into eighteen planktonic categories. Among them Lucifer spp. comprises of 52.21% was the most abundant group with a peak appeared in March whereas Chaetognaths were rarely observed in the entire study period. Species diversity exhibited a mixed trend with the highest values (0.776) of dominance observed in spring (March). The results of Canonical Corresponden
... Show More