The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.
The deliberative system of communicative studies is exposed to cultural openness, according to modern cultural studies, to establish a verbal language system that achieves reciprocal and cross-cultural relations. This research has examined the concept of deliberative approach in the contemporary Iraqi theater text by studying the deliberative system of text and its interrelationship with The stage of the verbal embodiment of the dramatic event, because the dramatic text achieves in its construction of racism, a deliberative approach between the verbal event and the language, and what later leads to the completion of the dramatic action. The research included four chapters. The first chapter was the systematic framework of the research, T
... Show MoreEarthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach
This paper presents a novel inverse kinematics solution for robotic arm based on artificial neural network (ANN) architecture. The motion of robotic arm is controlled by the kinematics of ANN. A new artificial neural network approach for inverse kinematics is proposed. The novelty of the proposed ANN is the inclusion of the feedback of current joint angles configuration of robotic arm as well as the desired position and orientation in the input pattern of neural network, while the traditional ANN has only the desired position and orientation of the end effector in the input pattern of neural network. In this paper, a six DOF Denso robotic arm with a gripper is controlled by ANN. The comprehensive experimental results proved the appl
... Show MoreBurdock ( Arctium lappa), is among the most popular plants in traditional medicine and it is associated with several biological effects. Literature survey revealed the presence of phenylpropanoid compounds .The most widespread are hydroxycinnamic acids ( mainly caffeic acid and chlorogenic acid) and lignans (mainly arctiin and arctigenin). This work will confirm the presence of these compounds in Arctium lappa, cultivated in Iraq, in both root and leaf samples. The dried plant samples were extracted by soxhlet with 80% methanol then separated the main constituents by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Identification of the isolated compounds wa
... Show MoreThe work reported in this study focusing on the abrasive wear behavior for three types of pipes used in oil industries (Carbone steel, Alloy steel and Stainless steel) using a wear apparatus for dry and wet tests, manufactured according to ASTM G65. Silica sand with
hardness (1000-1100) HV was used as abrasive material. The abrasive wear of these pipes has been measured experimentally by measuring the wear rate for each case under different sliding speeds, applied loads, and sand conditions (dry or wet). All tests have been conducted using sand of particle size (200-425) µm, ambient temperature of 34.5 °C and humidity 22% (Lab conditions).
The results show that the material loss due to abrasive wear increased monotonically with
This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.
The purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in
... Show MoreThe objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More