Twelve compounds containing a sulphur- or oxygen-based heterocyclic core, 1,3- oxazole or 1,3-thiazole ring with hydroxy, methoxy and methyl terminal substituent, were synthesized and characterized. The molecular structures of these compounds were performed by elemental analysis and different spectroscopic tequniques. The liquid crystalline behaviors were studied by using hot-stage optical polarizing microscopy and differential scanning calorimetry. All compounds of 1,4- disubstituted benzene core with oxazole ring display liquid crystalline smectic A (SmA) mesophase. The compounds of 1,3- and 1,4-disubstituted benzene core with thiazole ring exhibit exclusively enantiotropic nematic liquid crystal phases.
In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreA new series of Fe (III) , Co (II) , Ni (II) and Cu (II) complexes of the Schiff base, 5 (2-hydroxy benzylidine) -2-thio ether -1, 3, 4-thiadiazole were prepared and characterized .The imine behaves as a bidentate. The nature of bonding and the stereochemistry of the complexes were deduced from metal analyses, infrared, electronic spectra,magnetic susceptibility and conductivity measurements, an octahedral geometry was suggested for all complexes except the copper complex has a square planar geometry .preliminary in vitro tests for antimicrobial activity show that all the prepared compounds except iron complex display good activity to gram positive Staphelococcus aures and gram negative Escherchia coli.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe purpose of this paper is to identifying some of the physical, kinetic and electrical capabilities of the working muscles of patients with simple hemiplegic cerebral palsy, preparation of special exercises (rehabilitation and water) accompanied by symmetrical electrical stimulation in the rehabilitation of working muscles for patients with simple hemiplegic cerebral palsy, and identifying the effect of exercises, especially (rehabilitation and water), accompanied by symmetrical electrical stimulation, on some physical, kinetic and electrical capabilities in rehabilitating working muscles for patients with simple hemiplegic cerebral palsy. The researcher used the experimental approach with a one-group design with two pre and post-tests du
... Show Moresynthesis and characterization of New Bidentate schiff base Ligand Type(NO)Donor Atoms Derived from isatin and 3-Amino benzoic acid and Its complexes with Co(||),Cu(||),Cd(||)and Hg(||)Ions