The purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra ,Elemental microanalysis (C.H.N.S) and thermal analysis (TGA) , which showed a match with the molecular formulas of these ligands. A series of metal complexes (containing six complexes for each ligand) were synthesized from adding some metal ions (M+2 = Mn, Co, Ni, Cu, Cd and Hg) to the ligand with molecular formulas: ]Cl22(H2O)M(L1)2]Cl2 , [2(H2O)M(L2)2] All complexes that synthesized in this investigation were characterized by solubility, melting point, Fourier-transform infrared spectroscopy, electronic spectra, molar conductivity, magnetic susceptibility measurements, element microanalysis and flame atomic absorption, According to the ola inedresults an octahedral geometric structure of the prepared complexes was proposed. The biological activity of the prepared compounds against three types of bacteria, Escherichia coli (G-), and Pseudomonas (G-) Staphylococcus aureus (G+) were examined, the prepared compounds showed good activity and different from the selected bacteria.
order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

The research studied and analyzed the hybrid parallel-series systems of asymmetrical components by applying different experiments of simulations used to estimate the reliability function of those systems through the use of the maximum likelihood method as well as the Bayes standard method via both symmetrical and asymmetrical loss functions following Rayleigh distribution and Informative Prior distribution. The simulation experiments included different sizes of samples and default parameters which were then compared with one another depending on Square Error averages. Following that was the application of Bayes standard method by the Entropy Loss function that proved successful throughout the experimental side in finding the reliability fun
... Show MoreSocial Aspects in the Kingdom of Mali Through Ibn Battuta's book Tuhfat Alnuddar in Garaeb Al Amsar Wa Ajaeb Al Asfar
This research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreBackground: The adenomatoid odontogenic tumor is a relatively rare benign epithelial odontogenic tumor. It contains both epithelial and mesenchymal components. Few cases presented as an extrafollicular lesion or involve the mandible or associated with other odontogenic lesions. This paper represents a rare case of an extrafollicular AOT. Case presentation: A 24-year-old female had a painless swelling on the right side of the lower jaw since one-month duration. Intraorally there was a well defined fluctuant-blue swelling in the right alveolar premolar region measuring 1×2 cm obliterating the right lower buccal vestibule. Grade II mobility in the vital 44 and 45 teeth were observed. Panoramic radiographs showed a well-defined pear shaped
... Show MoreThe heavy metals Cd, Cu, Fe, pb, and Zn were determined in dissolved and particulate phases of the water,in addition to exchangeable and residual phases of the sediment and in the selected organs of the fish Cyprinus carpio collected from the Euphrates River near Al-Nassiriya city center south of Iraq during the summer period / 2009 .Also sediment texture and total organic carbon(TOC) were measured. Analysis emploing a flam Atomic Absorption Spectrophotometers . The mean regional concentrations of the heavy metals in dissolved (µg/l) and particulate phases (µg/gm) dry weight were Cd (0.15,16.13) ,Cu (0.59,24.48) ,Fe (726,909.4) ,Pb (0.20, 49.95) and Zn (2.5,35.62) respectively,and those for exchangeable and residual phases of the
... Show More