The new Azo ligand and its metal complexes have been prepared and characterized The reaction of 4-nitroaniline and 2-hydroxy-1-naphthaldehyde in a 1: 1 mole ratio resulted in the synthesis of ((E)-2-hydroxy-3-((4-nitrophenyl) diazenyl)-1-naphthaldehyde)(HL). The separation of monomeric complexes was accomplished by reacting ((E)-2-hydroxy-3-((4-nitrophenyl) diazenyl)-1-naphthaldehyde)(HL) with Cr, Mn II, Co II, Ni II, and Cu II metal ions in a mole ratio of 2: 1 (L: M). Elemental microanalysis, magnetic susceptibility, conductance, FT-IR, electronic spectra, and 1 HNMR, 13 C-NMR, and mass spectra were among the analytical and spectroscopic techniques used to describe the products. Based on the data collected during the characterization process, six coordinates were determined. The ligand and its complexes were tested against certain bacteria and fungi. The findings acquired suggested that the metal complexes are more active against a variety of organisms have been studied as compared to the free ligand.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreSmart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology
... Show MoreThe present work is to investigate the feasibility of removal vanadium (V) and nickel (Ni) from Iraqi heavy gas oil using activated bentonite. Different operating parameters such as the degree of bentonite activation, activated bentonite loading, and operating time was investigated on the effect of heavy metal removal efficiency. Experimental results of adsorption test show that Langmuir isotherm predicts well the experimental data and the maximum bentonite uptake of vanadium was 30 mg/g. The bentonite activated with 50 wt% H2SO4 shows a (75%) removal for both Ni and V. Results indicated that within approximately 5 hrs, the vanadium removal efficiencies were 33, 45, and 60% at vanadium loadings of 1
... Show MoreExperimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreIn terms of the core nucleus plus valence nucleon, shell-model calculations using two model spaces and interactions, the relationship between a nucleus' proton skin, and the difference in proton radii of mirror pairs of nuclei with the same mass number are investigated. In this work, two pairs of mirror nuclei will be studied: 17Ne-17N and 23Al-23Ne. For 17Ne-17N nuclei, p-shell and mixing of psd orbits are adopted with Cohen-Kurath (ckii) and psdsu3 interactions. While for 23Al-23Ne, the sd-shell and sdpf shell are adopted with the universal shell model (USD) and sdpfwa interactions. Also, the ground state density distributions, elastic form factors, and root mean square radii of these pairs' nuclei are studied and com
... Show More<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi
... Show MoreWind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di
... Show More