Metal complexes chrome(III), manganese(II), iron(III), cobalt(II), nickel(II), cupper(II) and zinc(II) with diazonium of 3-amino-2-chloropyridine of general formula [2-Cl-C5H3N≡N]n[MXm], where n=2 or 3 for divalent and trivalent metal, m= 4 or 6 were synthesized. The complexes have been characterized by flame atomic absorption, (C.H.N), molar conductance, magnetic susceptibility UV-vis spectra, infrared spectra,1H-NMR spectroscopy and thermo gravimetric analysis (TGA and DTA). The measurements showed that the divalent metal ion complexes (M2+) have (1:2) M:L ratio with tetrahedral geometry around metal ions while the trivalent metal ions (M3+) formed (1:3) metal: ligand ratios with octahedral geometry. Furthermore, the complex salts were displayed for antibacterial activity versus two types of bacteria Gram, positive (Staphylococcus aureus) and Gram negative (Klebsiella pneumonia). The complex 2 Mn(II) and 3 Fe(III), exhibited moderate activity against the two tested bacteria, while the complexes 1 Cr(III), 4 Co(II) 6 Cu(II) and 7 Zn(II) showed high activity .The complex 5 Ni(II) displayed moderate and weak against the type one and type two of bacteria respectively.
Background: Salvia officinalis is a plant belong to
Labiatae family .The common name of Salvia is sage
which mean save. The leaves of Salvia have special
oil which is effective against filamentous fungi and
yeasts such as Candida albicans which is the
causative agent of vaginal candidiasis in women
Methods. Cultures from 50 swabs of Candida
albicans isolated from vagina of 70 patient women
who complains from vaginal problems, their ages
(24-43) years from Central City Hospital during
Febreoury 2009 to April 2009 were cultured on
Sabouraud Dextrose Agar (SDA) .Nystatin was used
as positive reference standard to determine the
sensitivity of this fungus . and less this concentration
there was no min
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
The great importance of training made it as an investment for the organization, and assert the Quality of performance which support it by prepare the employee to the Current and future Jobs . The Research problem a rounded about How to measure the impact of training based on (ISO 10015) and its effect on the Quality of performance , How to evaluation the results of training to attained the training goals . The Research aims to find out the effects of application of international standard guidelines (ISO 10015) to attained the quality of audit work achieved in the Federal Board of Supreme Audit. The Research sought to achieve a number of objectives cognitive and applied on the basis of four key assumptions, and other su
... Show MoreAllah legislated marriage and made it dwelling, fellowship and mercy between
the two couples, Prophet Moh'd (peace of Allah and blessing be upon him) ordered a
husband to look after his wife, treat her with full charity and make love with here
every kindly. On the other hand, he ordered a wife to obey her husband and respect
him deeply, nevertheless, some obstacles may sometimes be appeared within the life
of their marriage, this may be caused by either a husband or a wife. This problem is
called lifely disobedience (AL-Noshooz).
In the other words, this means that a wife begins to hate her husband, refuse his orders
and not obey him.
In brief, they hate each other which leads to some marks appear in their
m
The problem of the current paper is embodied in the weakness of the female students
of the department of the Quran sciences in the college of Education for Women in the
University of Baghdad in the subject of reciting and memorizing the Holy Quran. This is what
the professors and the scientific and educational supervisors stress equally through their visits
to the students applicants during the period of their practical application of teaching in the
schools; especially that the subject is thought for four years during their study in the college.
That weakness is so explicit with a quite large number of the students-applicants, who are
supposed to be the future teachers in the subject of the Holy Quran and Islamic Ed
Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreAdministrative leaders conserned to understand the challenges which are faced their organizations and try to assimilate and adapt with the extent that achieves to it efficiency and effective- ess, and standing face to face to faceing any challenge.that threaten it’s existence thro- ugh using modern inputs reached to that level of these challenges and applied the study on a sample deliberate random from teaching hospitals of the Directorate General for Health Baghdad Karkh, and the Directorate General for Health Baghdad Rusafa and the City of Medicine , The importance of t
... Show More