A new Schiffbase derivative ligands [H4L1] and [H2L2] have been produced by condensed ophathaldehyde with ethylene diamine and [N1, N1'E, N1, N1'E)-N1, N1'-(1, 2-phenylenebis (methan-1-yl- 1ylidene)) diethane-1, 2-diamine] with 2-benzoyl benzoic acid. Schiffbase ligands have been separated and categorized by 1H, 13 C-NMR, (CHN) elemental analysis, UV-visible, mass spectroscopy and FTIR methods. Ten new coordination complexes were prepared and structurally diagnosed: [M(L1)Cl2] and [M2(L2)Cl2] where M(II) = Mn (II), Co(II), Ni(II), Cu(II) and Hg(II). The complexes have been typified by FTIR, UV-visble atomic absorption, molar conductance elemental analysis, and magnetic susceptibility. The details of the ligand (H4L1) compounds are getting an octahedral geometry while the complexes of ligand (H2L2) that are get square planar and tetrahedral geometries. Antimicrobial examinations show good results in the sharing
Consequence of thermal and concentration convection on peristaltic pumping of hyperbolic tangent nanofluid in a non‐uniform channel and induced magnetic field is discussed in this article. The brief mathematical modeling, along with induced magnetic field, of hyperbolic tangent nanofluid is given. The governing equations are reduced to dimensionless form by using appropriate transformations. Exact solutions are calculated for temperature, nanoparticle volume fraction, and concentration. Numerical technique is manipulated to solve the highly non‐linear differential equations. The roll of different variables is graphically analyzed in terms of concentration, temperature, volume fraction of nanoparticles, axial induced magnetic fie
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreThe paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme
... Show MoreThe research aims to achieve market share requirements and reach the targeted competitive price through the application of management accounting techniques represented by continuous improvement technique and target costing under an Activity Based Cost (ABC) system and Activity Based Management (ABM), In Muthanna Cement Company to reach the rationalization of the cost of the product and maintain the required quality and improve the profitability of the company.
The problem of research has emerged in the inability of local firms to enter into effective competition with other companies operating in the same economic sector, Because of the high cost of its products, Which led to the sale of the product at prices below its cost, and t
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreThis paper tackles methods of teaching conversation in Russian to students speaking Arabic. It analyses the differences between the two languages, as well as the difficulties and major errors faced by Arabic speakers studying Russian. Particularly, it looks at the difficulty of transforming spoken language. Finally, the paper suggests ways for teaching spoken language and treating the reasons behind making errors.
Аннотация
Данная статья рассматривает методы преподавания говорения на русском языке для носителей арабского яз
... Show More