A new ligand complexes have been synthesis from reaction of metal ions of Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II) and Pt(II) with schiff base LH. 5-[(2-Hydroxy-naphthalen-1-ylmethylene)-amino]-2-phenyl-2,4-dihydro-pyrazol-3-one, this ligand was characterized by Fourier transform infrared (FTIR), UV-vis, 1H, 13CNMR, and mass spectra. All complexes were characterized by techniques micro analysis C.H.N, UV-vis and FTIR spectral studies, atomic absorption, chloride content, molar conductivity measurements and magnetic susceptibility. The ligand acts as bidentate, coordination through nitrogen atom from azomethin group and deprotonated phenolic oxygen atom. The spectroscopic and analytical measurements showed that the geometric shape of the prepared complexes is octahedral, while the square planar of the palladium and platinum complexes. The ligand and its complexes were having been screened for their antimicrobial activities and antioxidant
Flexure members such as reinforced concrete (RC) simply supported beams subjected to two-point loading were analyzed numerically. The Extended Finite Element Method (XFEM) was employed for the treatment the non-smooth h behaviour such as discontinuities and singularities. This method is a powerful technique used for the analysis of the fracture process and crack propagation in concrete. Concrete is a heterogeneous material that consists of coarse aggregate, cement mortar and air voids distributed in the cement paste. Numerical modeling of concrete comprises a two-scale model, using mesoscale and macroscale numerical models. The effectiveness and validity of the Meso-Scale Approach (MSA) in modeling of the reinforced concrete beams w
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreWhenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show MoreThe distress of moisture induced damage in flexible pavement received tremendous attention over the past decades. The harmful effects of this distress expand the deterioration of other known distresses such as rutting and fatigue cracking. This paper focused on the efficiency of using the waste material of demolished concrete to prepare asphalt mixtures that can withstand the effect of moisture in the pavement. For this purpose, different percentages of waste demolished concrete (0, 10, 20, 30, 50, 70 and 100) were embedded as a replacement for coarse aggregate to construct the base course. The optimum asphalt contents were determined depending on the Marshall method. Then after, two parameters were founded to evaluate the moisture
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
The aim of the research is to shed light on the stages of developing the Iraqi virtual science Library(IVSL) project, and to define its distinctive role in providing all kinds of electronic resources to researchers from professors and graduate students, to identify its contents , the entry interfaces and applications of use, and provide them through electronic portals to publishing houses, research institutions and international universities, The research sample included the teaching staff and researchers participating in educational qualification courses at the Continuing Education Center at the University of Baghdad, The research population and its sample consisted of the category of (IVSL) users, and its sample (387) users. Analysis meth
... Show MoreUtilizing the Turbo C programming language, the atmospheric earth model is created from sea level to 86 km. This model has been used to determine atmospheric Earth parameters in this study. Analytical derivations of these parameters are made using the balancing forces theory and the hydrostatic equation. The effects of altitude on density, pressure, temperature, gravitational acceleration, sound speed, scale height, and molecular weight are examined. The mass of the atmosphere is equal to about 50% between sea level and 5.5 km. g is equal to 9.65 m/s2 at 50 km altitude, which is 9% lower than 9.8 m/s2 at sea level. However, at 86 km altitude, g is close to 9.51 m/s2, which is close to 15% smaller than 9.8 m/s2. These resu
... Show MoreA total of 1346 hard ticks (863♂ and 483 ♀) infested 104 camels, 60 alive camels with 93.33% infestation rate and 44 carcasses of camels had 79.54% infestation rate The total infestation rate was 87.5 %. The current study results revealed ten species of hard ticks family Ixodidae Koch, 1844 related to genus Hyalomma as following: H. dromedarii Koch, 1844, H. schulzii Morel, 1969, H. turanicum Pomerantsev, 1946, H. excavatum Koch, 1844, H. truncatum Koch, 1844, H. scupense Schulzii, 1919, H. marginatum Koch, 1844, H. anatolicum Koch, 1844, H. rufipes Koch, 1844, H. impeltatum Schulze & Schlottke, 1930 from camel Camelus dromedarius Linnaeus, 1758 collected from 21 regions belonging to six provinces in middle, w
... Show MoreThe effect of 5555 strategy on reading comprehension among 4th preparatory students Assist. Prof. Dr. Hassan Khilbas Hammadi College of Education Ibn Rushd – The University of Baghdad Assistant Lecturer. Waleed Khaled Talib Directorate – General For Education Province Of AL - Anbar The purpose of study is to identify the effect of 5555 strategy on reading comprehension among 4th preparatory students. To do this, null hypothesis was postulated. The author hypothesize that there is no a statistically significant difference at (0.05) level between experimental group's scores who study reading comprehension subject following the 5555 strategy and control group's scores who study the same subject following the traditional method in readin
... Show More