D-mannose sugar was used to prepare [benzoic acid 6-formyl-2,2-dimethyl-tetrahydrofuro[3,4-d][1,3]dioxol-4-yl ester] (compound A). The condensation reaction of folic acid with (compound A) resulted in the formation of new ligand [L]. These compounds were characterized by elemental analysis CHN, atomic absorption A.A, (FT-I.R.), (U.V.-Vis), TLC, E.S. mass (for electrospray), molar conductance, and melting point. The new tetradentate ligand [L], reacted with two moles of some selected metal ions and two moles of (2-aminophenol), (metal : ligand : 2-aminophenol) at reflux in water medium to give a series of new complexes of the general formula K2[M2(L)(HA)2] where M= Co(II), Ni(II), Cu(II) and Cd(II). These complexes were characterized by elemental analyses [(C.H.N) and (A.A)], (FTI.R), (U.V-Vis.), molar conductance, 1 H,13C-NMR, TLC and magnetic moment measurements. From the above data the proposed geometry about Co(II), Ni(II), Cu(II) and Cd(II), is tetrahedral structure. Biological activity of the lignd and its complexes was carried out on staphylococcus aureu, bacillus subtilis escherichia coli and psedomonas aeruginosa.
The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreThe Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate
... Show MoreBackground: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show MoreA Survey Study Of A Sample Of The Public Of Baghdad Governorate
The current study aimed to identify the most prominent psychological and behavioral repercussions of the exposure of the elderly to the news of the Corona pandemic and to determine the mechanisms of their exposure. On an intended sample on both sides of (Al-Karkh and Al-Rasafa) and the simple random sample was adopted to choose the place of distribution of the questionnaire and the intentional sample.
The research concluded several results, most TV news is still a primary source of information and that most of the sample move between stations to see more information about the pandemic and that the presentation of views confuses the elderly ،There
... Show MoreAbstract:
The current research is aimed at analyzing the impact of the dimensions of Job involvement of all of (the enthusiasm, the Devotion, Assimilation ) in the Crystallize organizational Identification across the dimensions of (organizational loyalty, membership, similarities) and was named the Middle East, the Iraqi Investment Bank room to look as the research community of staff adopted in the bank, to be applied to a Random sample of (100) employees working in the said bank, and developed for the purposes of data collection, a questionnaire form included three axes covered (32) paragraph of the measure, which is included adopted Liekrt Quintet for the
... Show MoreThe financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreThis research aims toknow the learning styles according to the model of Felder and Silverman and its relationship to effectively self- perceived mathematicalamong students of the Faculty of Education Pure Sciences - Ibn al-Haytham. By answering the following questions: 1. What are the preferred methods of learning among students in the mathematics department according to the model Felder and Silverman? 2. What is the mathematicalself-perceived levelof the students at the Department of Mathematics effectiveness level? 3. What is the relationship between learning styles according to the Felder model and Silverman and the effectiveness of mathematical self-perceived of the students of the Department of Mathematics? The research sample consiste
... Show More