New complexes of the [M(Ura)(Phen)(OH2)Cl2]Cl.2H2O type, where (Ura) uracil ; (Phen) 1,10-phenanthroline hydrate; M (Cr+3 , Fe+3 and La+3) were synthesized from mix ligand and characterized . These complexes have been characterized by the elemental micro analysis, spectral (FT-IR., UV-Vis, 1HNMR, 13CNMR and Mass) and magnetic susceptibility as well the molar conductive mensuration. Cr+3, Fe+3 and La+3- complexes of six–coordinated were proposed for the insulated for three metal(III) complexes for molecular formulas following into uracil property and 1,10-phenanthroline hydrate present . The proposed molecular structure for all metal (III) complexes is octahedral geometries .The biological activity was tested of metal(III) salts, liga
... Show MoreNew complexes of the [M(Ura)(Phen)(OH2)Cl2]Cl.2H2O type, where (Ura) uracil ; (Phen) 1,10-phenanthroline hydrate; M (Cr+3 , Fe+3 and La+3) were synthesized from mix ligand and characterized . These complexes have been characterized by the elemental micro analysis, spectral (FT-IR., UV-Vis, 1HNMR, 13CNMR and Mass) and magnetic susceptibility as well the molar conductive mensuration. Cr+3, Fe+3 and La+3- complexes of six–coordinated were proposed for the insulated for three metal(III) complexes for molecular formulas following into uracil property and 1,10-phenanthroline hydrate present . The proposed molecular structure for all metal (III) complexes is octahedral geometries .The biological activity was tested of metal(III) salts, ligands
... Show MoreThe research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, parti
... Show MoreBackground: The purposes of this study were to determine the photogrammetric soft tissue facial profile measurements for Iraqi adults sample with class II div.1 and class III malocclusion using standardized photographic techniques and to verify the existence of possible gender differences. Materials & methods: Seventy five Iraqi adult subjects, 50 class II div.1 malocclusion (24 males and 26 females), 25 class III malocclusion (14 males and 11 females), with an age range from 18-25 years. Each individual was subjected to clinical examination and digital standardized right side photographic records were taken in the natural head position. The photographs were analyzed using AutoCAD program 2007 to measure the distances and angles used in t
... Show MoreUsing remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST
Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show More