This paper concerns is the preparation and characterization of a bidentate ligand [4-(5,5- dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl) benzene sulfonamide]. The ligand was prepared from fusing of sulfamethoxazole and dimedone at (140) ºC for half hour. The complex was prepared by refluxing the ligand with a bivalent cobalt ion using ethanol as a solvent. The prepared ligand and complex were identified using Spectroscopic methods. The proposed tetrahedral geometry around the metal ions studied were concluded from these measurements. Both molar ratio and continuous variation method were studied to determine metal to ligand ratio (M:L). The M to L ratio was found to be (1:1). The adsorption of cobalt complex was carried out using bentonite as adsorbent. The optimization of the adsorption conditions were studied as a function of contact time , temperature , pH , adsorbent weight and particle size. The results revealed that the time needed to reach concentration equilibrium was 60 min for cobalt complex. While the trend of the adsorption isotherm was L1 type according to Giles classification . Thermodynamic functions (ΔH, ΔG, and ΔS) were calculated.
Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne
... Show MoreNominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak
Background: This study was conducted to evaluate the hard palate bone density and thickness during 3rd and 4th decades and their relationships with body mass index (BMI) and compositions, to allow more accurate mini-implant placement. Materials and method: Computed tomographic (CT) images were obtained for 60 patients (30 males and 30 females) with age range 20-39 years. The hard palate bone density and thickness were measured at 20 sites at the intersection of five anterioposterior and four mediolateral reference lines with 6 and 3 mm intervals from incisive foramen and mid-palatal suture respectively. Diagnostic scale operates according to the bioelectric impedance analysis principle was used to measure body weight; percentages of body fa
... Show MoreWomen are considered the real power to build societies, as they are half of society, and it is their responsibility to raise generations، as human history testifies to the recording of great names with their giving and achievement in various scientific, social and humanitarian disciplines. Because of the importance of women in our lives, society must give them special care, whether at home or within the community structure to which they belong, so that they contribute to the image that brings about a transformation in the public scene, as well as providing them with support to take charge of bringing about change themselves, and this explains the interest of the press at all levels. Women's issues and topics through various journal
... Show MoreAbstract
This study aims to find the relationships between social capital (social network, social trust, shared goals) and knowledge sharing (knowledge Donating, knowledge collecting) as independent variables and their impact on improving the quality of educational services (academic staffs quality, Quality of teaching methods and study curriculums). This research is an important, because it attempts to identify the relationship between social capital and the knowledge sharing and their effect on improving the quality of educational service for universities. The study problem was determined in several questions related to the nature of the correlation relationship - the impact between the different independent variables (
... Show MoreConstitute a planning problem on the basis of personal experience and self-governance in the service organizations away from quantitative scientific method in planning an anchor and a platform, who made a recent research study, analysis and interpretation through scientific methodology adopted which formed its contents, The research aims to identify the true reality of production planning in service organizations, specifically in the Baghdad Hotel as a society to look, in order to assess the best strategy through the standard cost of the strategies of tracking and settlement to cope with developments on services demand changes, Search results confirmed that the settlement rates of production strategy is the best strategy in accordance wi
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.
This article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H. Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation where , has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.