In this research various of 2,5-disubstituted 1,3,4-oxadiazole (Schiff base, oxo-thiazolidine , and other compounds) were synthesized from 2,5-di(4,4?- amino-1,3,4-oxadiazole ) which use quently synthesized from mixture of 4-amino benzoic acid and hydrazine in the presence of polyphosphorus acid. The synthesized compounds were characterized by using some Spectral data (UV, FT-IR, and 1H-NMR).
The new liganed Schiff base named [(E)-3-hydroxy-4-((3,4,5- trimethoxybenzylidene)amino) naphthalene-1- sulfonic acid] was synthesized from 3,4,5-trimethoxybenzyldehyde and 1-amino-2-aphthol-4- sulfonic acid in equal molar ratio. A series of new metal complexes' of the common molecular formulation [M(L)2(H2O)2].H2O are synthesized and characterized by IR, UV–Vis spectra, mass spectra, atomic absorption, elemental analyses, chloride content, magnetic susceptibility and conductivity measurements as well as thermo gravimetric analysis (TGA, DSC). Consistent with results of the magnetic and spectral studies, the advised geometrical structures for all of the prepared complexes have been octahedral formula
Advancements and modernizations introduced into the educational and pedagogical systems have significantly impacted teaching processes and how subjects are presented and explained to students. The focus has shifted to how learners interact with the material they need to learn, providing sufficient opportunities for learning and granting them freedom and self-confidence to achieve learning objectives. The research problem stems from the researcher's experience as a lecturer in the College of Physical Education and Sports Science, particularly in teaching basketball. She observed that some instructors were deficient in using the most effective teaching methods. The researcher formulated her research question based on these observations: "What
... Show MoreBackground: The present in-vitro study was undertaken to evaluate and compare fracture resistance of weakened endodontically treated premolars with class II MOD cavities restored with different bulk fill composite restorations (EverX posterior, Alert, Tetric EvoCeram Bulk Fill, and SDR). The type and mode of fracture were also assessed for all the experimental groups. Materials and Method: Forty-eight human adult maxillary premolar teeth were selected for this study. Standardized extensive class II MOD cavities with endodontic treatment were prepared for all teeth, except those that were saved as intact control. The teeth were divided into six groups of eight teeth each (n=8): (Group 1) intact control group, (Group 2) unrestored teeth with
... Show MoreAbstract:
Since the railway transport sector is very important in many countries of the world, we have tried through this research to study the production function of this sector and to indicate the level of productivity under which it operates.
It was found through the estimation and analysis of the production function Kub - Duglas that the railway transport sector in Iraq suffers from a decline in the level of productivity, which was reflected in the deterioration of the level of services provided for the transport of passengers and goods. This led to the loss of the sector of importance in supporting the national economy and the reluctance of most passengers an
... Show MoreApple slice grading is useful in post-harvest operations for sorting, grading, packaging, labeling, processing, storage, transportation, and meeting market demand and consumer preferences. Proper grading of apple slices can help ensure the quality, safety, and marketability of the final products, contributing to the post-harvest operations of the overall success of the apple industry. The article aims to create a convolutional neural network (CNN) model to classify images of apple slices after immersing them in atmospheric plasma at two different pressures (1 and 5 atm) and two different immersion times (3 and again 6 min) once and in filtered water based on the hardness of the slices usin
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show More