The researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes with octahedral geometry except Mn complex has tetrahedral geometry. The Ligand functions as a neutral tridentate ligand in all complex investigations, coordinating Cr(III), Zn(II), Ru(III), and Rh(III) ions via the N atom of amine and azo groups, as well as the O phenolic OH group. When coordinated with the Cu(II), Co(II), and Mn(II) ions via the two N atoms of the amine and azo groups, this Ligand functions as a neutral bidentate.
Background: The rapid integration of Artificial Intelligence (AI) into healthcare necessitates that nursing education evolves to equip students with essential technological competencies. Objectives: To explore pediatric nursing students' perceptions of AI in nursing and analyze associations with sociodemographic factors and prior AI knowledge. Methods: A descriptive cross-sectional study was conducted from December 2024 to March 2025 across five universities in Baghdad. A non-probability sample of 500 pediatric nursing students completed the Shinners Artificial Intelligence Perception (SAIP) tool. Data were analyzed using descriptive statistics and inferential comparisons (t-tests/ANOVA) via SPSS. Results: Participants had a mean ag
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreThe current research aims through its chapters to verify the relationship and impact of strategic leadership as an independent variable in the marketing performance as a respondent variable, in a leap cement plant, and try to come up with a set of recommendations that contribute to enhancing the practice and adoption of the two variables in the organization under discussion. And based on the importance of the research topic to the community, and to the researched organization and its members, the analytical and analytical approach was adopted in the completion of this research, and the research community included a leap cement plant in Anbar Governorate, while the research sample was represented by (department heads, and people o
... Show MoreCollapsible soil has a metastable structure that experiences a large reduction in volume or collapse when wetting. The characteristics of collapsible soil contribute to different problems for infrastructures constructed on its such as cracks and excessive settlement found in buildings, railways channels, bridges, and roads. This paper aims to provide an art review on collapse soil behavior all over the world, type of collapse soil, identification of collapse potential, and factors that affect collapsibility soil. As urban grow in several parts of the world, the collapsible soil will have more get to the water. As a result, there will be an increase in the number of wetting collapse problems, so it's very important to com
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More