The (E)-4-chloro-N-(2-(dimethylamino)ethyl)-5-((8-hydroxy quinolin-5-yl)diazenyl)-2-methoxybenzamide azo ligand (L) has been synthesized through the reaction of diazonium salt for 5-amino-4-chloro-N-(2-(dimethylamino) ethyl)-2-methoxybenzamide with 8-hydroxyquinoline and identified azo ligand (L) using spectroscopic studies (FTIR, UV-Vis, 1H and 13CNMR, mass), and micro-elemental analysis (C.H.N). Metal chelates of Co(II), Ni(II), Cu(II), as well as Zn(II) have been completed as well as characterized using mass spectra, flame atomic absorption, elemental analysis (C.H.N), infrared, UV-Vis spectroscopy, as well as conductivity, magnetic measurements. The metal-to-ligand ratio in all complexes, as determined by analytical data, was 1:2 and ex
... Show MoreTwo local fish Himri Carasobarbus luteus (Heckel, 1843) and Hishni Liza abu (Heckel, 1843) were stained with Alizarin Red and featured some anatomical qualities which cleared the difference of the muscular and skeletal fabric for each fish. Since clear Histologic differences appeared in these two species, it was intended from this study the possibility of adopting a diagnosis between local fish species by staining bones and tissues.
Background: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show Morein this worl three types of complexed phenolic resins were prepared using various additives such as and improving the aim of this work higher mechanical properties this work is done
Overall enthalpy and entropy of complex formation were calculated from stability constant measurements at different tempreture also experimental results
The dynamic thermomechanical properties, sealing ability, and voids formation of an experimental obturation hydroxyapatite-reinforced polyethylene (HA/PE) composite/carrier system were investigated and compared with those of a commercial system [GuttaCore (GC)]. The HA/PE system was specifically designed using a melt-extrusion process. The viscoelastic properties of HA/PE were determined using a dynamic thermomechanical analyser. Human single-rooted teeth were endodontically instrumented and obturated using HA/PE or GC systems, and then sealing ability was assessed using a fluid filtration system. In addition, micro-computed tomography (μCT) was used to quantify apparent voids within the root-canal space. The data were statistically analys
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More