The mechanism for selecting the President of the Republic and his constitutional powers under the Constitution of the Republic of Iraq
1,3,4-oxadizole and pyrazole derivatives are very important scaffolds for medicinal chemistry. A literature survey revealed that they possess a wide spectrum of biological activities including anti-inflammatory and antitumor effects.
To describe the synthesis and evaluation of two classes of new niflumic acid (NF) derivatives, the 1,3,4-oxadizole derivatives (compounds 3 and (4A-E) and pyrazole derivatives (compounds 5 and 6), as EGFR tyrosine kinase inhibitors in silico and in vitro.
The designed compounds were synthesized using convent
Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott
Water quality sensors have recently received a lot of attention due to their impact on human health. Due to their distinct features, environmental sensors are based on carbon quantum dots (CQDs). In this study, CQDs were prepared using the electro-chemical method, where the structural and optical properties were studied. These quantum dots were used in the environmental sensor application after mixing them with three different materials: CQDs, Alq3 polymer and CQDs and Alq3 solutions using two different methods: drop casting and spin coating, and depositing them on silicon. The sensitivity of the water pollutants was studied for each case of the prepared samples after measuring the change in resistance of the samples at a temperature of
... Show MoreAim: The Aim of the study is to compare between Er,Cr:YSGG 2780 nm laser and carbide fissure bur in root-end resection regarding the morphological variations, temperature changes and the duration of resection process.
Settings and Design: 5 W, 25 Hz, 50% water, 80% air,25.47 J/cm2 .
Material and method: twenty-one extracted single rooted teeth endodontically were treated, twenty teeth were obturated and divided into two groups according to method of resection. Group 1 root-end resected using cross cut carbide bur while group 2 root-end resected using laser with MGG6 sapphire tip of 600 μm diameter. Temperature on external root surface and duration of resection were recor
... Show MoreBackground: Prolapsed intervertebral disc is an important and common cause of low backache. MRI has now become universally accepted investigation for prolapsed intervertebral disc. We, however, regularly come across situations, when MRI shows diffuse disc bulges, even at multiple levels, which cannot be correlated clinically and when such cases are operated, no significant disc prolapse is found resulting in negative exploration.Objective: To evaluate the role of M.R.I. finding not only for diagnosis of disc herniation at lumbar region but also for localization the level of herniationMethods: A prospective study on seventy five symptomatic low backache and MRI confirmed prolapsed intervertebral disc patients at lumbo-sacral region were o
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show More