In this work, N-hydroxy phthalimide derivatives (NHPID) were synthesized from the nucleuphilic substitution reactions of (NHPI) with different halides (alkyl halides, sulfonyl halides, benzoyl halides and benzyl halides). The products were distinguished using FTIR spectrum and Nuclear magnetic resonsnce (1H-NMR and 13CNMR), in addition to other characteristic methods such as sodium fution for sulfur determination. followed by measuring antibacterial (with different types of gram positive/gram negative bacteria) and antifungal activities of these compounds.
In this study, doped thin cadmium peroxide films were prepared by pulsed laser deposition with different doping concentrations of aluminium of 0.0, 0.1, 0.3, and 0.5 wt.% for CdO2(1-X)Al(X) and thicknesses in the range of 200 nm. XRD patterns suggest the presence of cubic CdO2 and the texture factor confirms that the (111) plane was the preferential growth plane, where the texture factor and the grain size decreased from 2.02 to 9.75 nm, respectively, in the pure sample to 1.88 and 5.65 nm, respectively, at a concentration of 0.5 wt%. For the predominant growth plane, the deviation of the diffraction angle Δθ and interplanar distance Δd from the standard magnitudes was 2.774° and 0.318 Å, respectively, for the pure sample decreased to
... Show More
Photorefractive keratectomy (PRK) is the refractive technique that began with a physical scraping of the epithelial layer of cornea subsequent by laser treatment. Post this procedure to about 48 hours the removed epithelial layer regenerated to protect the eye again. The regeneration process (called re-epithelization) started from the limbus of the cornea toward the central part of it. The re-epithelization mechanism consists of a change in cell density (mitosis) and cell concentration (migration) with a velocity in two directions: radial and tangential. In the present study, an estimation for both radial (responsible for the overlapped layers toward the outward direction of the cornea) and tangential comp
... Show MoreBecause of the diverse circumstances in Andalusia, the Jews lost much of the atmosphere of freedom and coexistence, which they enjoyed under Islamic rule there, to leave more Jews in the sixth century AH, under Spanish rule abolishing the existence of the other. And to impose his negativity with unjust domination. What motivated the people of Judaism; to turn their faces on the Islamic East; according to the coexistence climates that glorified various religions. It has emerged in this regard Benjamin Title (d. 685 e), who made a long journey to the east, recorded in the texts of the traveler, what will be shown research, God willing.
Transformations of the actor when acting many characters are the product of joint work between the actor and the director through the instructions and the exercises that facilitate the reach for the desired goal.
The method or way has often been used which is Stanislavsky premises in his work with the actor in the role. The first section consists of two parts under the heading of the actor's work with himself. The two parts are preparing the actor in creative suffering (internal), and in coexistence and embodiment (outside). The second section is the book of the actor's work with the role. The current research aims at identifying the mechanism of the acting performance transformations among many characters of the same actor.
... Show MoreCapparis spinosa is one of the oldest genera grown in Iraqi land with worldwide traditional medicinal uses beside the culinary uses. These uses were own to the presence of many phytochemical including flavonoids, polyphenols. Among the reported polyphenolic acids are caffeic, chlorogenic and ferulic acids with well-known powerful antioxidant properties. The present work aimed to identify the presence of these polyphenolic acids in Iraqi caper naturally gown in the rural area of middle Iraq following standard chromatographic procedures. Aerial parts of the plant (buds, berries and leaves) were extracted with hydroalcoholic solvent by maceration method. Thin layer chromatographic techniques and HPLC analysis were performed to iden
... Show MoreFootball is a game derived from the integration of football and tennis skills and some of the laws of volleyball and yard measurements, and since it is a newly created game must be studied and cover all aspects related to them to reach them to the highest levels. It is known that each game or sports activity should have Physical capabilities and motor skills, which is important to determine the level of technical performance where the abilities of the game contribute to mastering skills. The significance of the research in determining the standard levels of physical and motor abilities of the football players to help young professionals and the sponsors to increase the efficiency of these capabilities and thus raise the level of per
... Show MoreSystemic lupus erythematosus (SLE) is one of the autoimmune disorders, generated by a production of specific autoantibodies against self-antigens before the occurrence of clinical symptoms. The etiology of disease is still unknown, although there have been several infectious agents that have been associated with SLE development, especially in genetically predisposed individuals. Herpes simplex virus-I and -II (HSV-I and -II) and Toxoplasma gondiiare two infectious agents that have been suggested to be involved in SLE etiology. Accordingly, the present study assessed anti- HSV-I and -II and anti-T. gondii IgG and IgM antibodies by enzyme linked immunosorbent assay in sera of 64 SLE female patients and 32 healthy control women. The patients w
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper