Hippuric acid and 3-amino phenol were used to make the 4-(2-Amino-4-hydroxy-phenylazo)-benzoylamino-acetic acid diazonium salt, a new Azo molecule that is a derivative of the (4-Amino-benzoylamino)-acetic acid diazonium salt. We found out what the ligand's chemical structures were by using information from 1HNMR, FTIR, CHN, UV-Vis, LC-mass spectroscopy, and thermal analyses. To make metal complexes of the azo ligand with Co(II), Cu(II), Ru(III), and Rh(III) ions, extra amounts of each azo ligand were mixed with metal chloride salts in a 2:2 mole ratio. The stereochemical structures and geometries of the metal complexes that were studied were guessed based on the fact that the ligand exhibited tetradentate bonding behavior when combined w
... Show MoreThe ascaroid nematode Contracaecum rudolphii was recovered in large numbers from the
digestive tract of Phalacrocorax carbo collected in Baghdad area, Central Iraq. The infection
rates of the two sexes of the bird and some meristic and morphometric characters of the
parasite that allowed species determination of the nematode Contracaecum rudolphii were
discussed. This finding represents a new host record for this nematode in Iraq.
The objective of this paper is, first, study a new collection of sets such as field and we discuss the properties of this collection. Second, introduce a new concepts related to the field such as measure on field, outer measure on field and we obtain some important results deals with these concepts. Third, introduce the concept of null-additive on field as a generalization of the concept of measure on field. Furthermore, we establish new concept related to - field noted by weakly null-additive on field as a generalizations of the concepts of measure on and null-additive. Finally, we introduce the restriction of a set function on field and many of its properties and characterizations are given.
A specific, sensitive and new simple method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation of ion pair compound between methyldopa and potassium hexacyanoferrate in acidic medium to obtain a yellow precipitate complex using long distance chasing photometer (NAG-ADF-300-2). The linear range for calibration graph was 0.05-35 mmol/L for cell A and 0.05-25 mmol/L for cell B, and LOD 1.4292 µg /200 µL for both cells with correlation coefficient (r) 0.9981 for cell A and 0.9994 for cell B, RSD% was lower than 0.5 % for n=8 for. The results were compared with classical method UV-Spectrophotometric at λ max=280 nm and turbi
... Show MoreThe present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreThis research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re
Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show More