New binuclear Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II) Complexes of N2S2 tetradentate or N4S2 hexadentate symmetric Schiff base were prepared by the condensation of butane-1,4-diylbis(2-amino ethylcarbamodithioate) with 3-acetyl pyridine. The complexes having the general formula [M2LCl4] (where L=butane-1,4-diyl bis (2-(z)-1-(pyridine-3-ylethylidene amino))ethyl carbamodithioate, M= Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II)), were prepared by the reaction of the mentioned metal salts and the ligand. The resulting binuclear complexes were characterized by molar conductance, magnetic susceptibility ,infrared and electronic spectral measurements. This study indicated that Mn(II), Ni(II) and Cu(II) complexes have octahedral geometry, while Co(II) Zn(II) and Hg(II) complexes are proposed to be tetrahedral structure .K
Buildings such as malls, offices, airports and hospitals nowadays have become very complicated which increases the need for a solution that helps people to find their locations in these buildings. GPS or cell signals are commonly used for positioning in an outdoor environment and are not accurate in indoor environment. Smartphones are becoming a common presence in our daily life, also the existing infrastructure, the Wi-Fi access points, which is commonly available in most buildings, has motivated this work to build hybrid mechanism that combines the APs fingerprint together with smartphone barometer sensor readings, to accurately determine the user position inside building floor relative to well-known lan
... Show MoreBanned temporarily divers has increased greatly in the society and for silly reasons.
This issue aroused a great controversy .There are so many motivations to Aleve deep in it.
There are so many approach hes to talk it . It deserves to be studied in a simple way but
thoroughly and comprehensively .Dune to this great importees and to its spread among
married couples for their agnorance concerning its voles' and dangers .
I have been stimulated and encouraged to go through and close read its details
aleomplish this research.
It is a olevided in to an introduction and three chapters :
1-chapter one : defines the terminology of banned temporarily clearer's and it legal situation .
2-chapter two : Terms of banned te
In any language there is some amount of difference between written language (planned) and spoken language (spontaneous). Since planned speech could be considered a form of written language, it could be inferred that there are also differences between planned speech and spontaneous speech. Some of these differences are very clear in terms of syntax, lexis, phonology and discourse. These differences are highlighted in order to make a clear distinction between spontaneous and planned speech.
This paper is an attempt to show the differences between the two forms of a language (written & spoken English) as far as number of linguistic features are tackle
... Show MoreShadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a
... Show MoreIn this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and the commutativity of Lie ideal under certain conditions were proved.
KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1