A new mixed ligand complexes were prepared by reaction of quinoline -2-carboxylic acid (L1) and 4,4?dimethyl-2,2?-bipyridyl (L2) with V(IV),Cr(III), Rh(III), Cd(II) and Pt(IV) ions. These complexes were isolated and characterized by (FT-IR) and (UV-Vis) spectroscopy, elemental analysis, flame atomic absorption technique, thermogravimetric analysis, in addition to magnetic susceptibility and conductivity measurements. Most complexes were mononuclear and with octahedral geometry, except Cd (II) with tetrahedral geometry, and V (IV) with square pyramidal geometry. A theoretical treatment of the ligands and the prepared complexes in gas phase was done using two programs Hyperchem.8 and Gaussian program (GaussView Currently Available Versions (5.0.9) along with Gaussian 09 which is the latest in the Gaussian series of programs).
This article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
This work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . The package designed based on Visual Basic 6. The efficiency of the designed program was tested on a 10 persons with different levels of education and ages and the results show an increase in their reading speed of approximately 25% in the first month of training with noticeable enhancement in the memory as well as an increase in the ability to read for longer time without feeling nerves or boring, a nonlinear continuously increase in reading speed is assured after the first mo
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreThe current research aims to highlight the role of social networking sites in the dissemination of scientific knowledge and the importance of their use by researchers, and the researcher relied on the descriptive approach and the survey method. Among the data collection tools are the questionnaire and paper and electronic sources. Among the most important results that the research came out with: The number of the subscribers’ sites was (14) sites, and the most used social sites for receiving and Disseminating Scientific knowledge are: Facebook, Telegram, WhatsApp, Viber, Messenger and YouTube. All respondents receive tacit knowledge (Exchange of Messages and News) through social networking sites, and few of them do not receive explicit kn
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreExcerption and inclusion are two terms in Arabic rhetoric. The excerption is defined as a taking a part of text from Holly Quran or Hadith and put it in a poem, verse line, or put it in a prose text. But the linguistics expand the concept of this term to include taking from another sciences and knowledge, like Grammar, Philology, and Prosody.
Inclusion is defined as taking a verse line or part of verse line from another poet to put it in a new poem, it is necessary that the poet who take the text should declare it, and if he hides it, it will be plagiarism.
This search is use these two terms in architecture, we have now new two terms in architecture, first one; architectural excerption, it means the designer takes a part of religio
The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show More