A novel series of chitosan derivatives were synthesized via reaction of chitosan with carbonyl compounds and grafted it’s by with different amine compounds substituted hydrogen. The produced polymers were characterized by different analyses FTIR, 1HCNMR, XRD, DSC and TGA. Solubility in water as well as many solvent was investigated, antibacterial activity of chitosan and its derivatives against two types of bacteria E. coli and S. aureus was also investigated. The results showed that derivatives sort of have antibacterial activities against Esherichia coli (Gram negative) better than chitosan whilst compound IX has better antibacterial against Staphylococcus aureus (Gram positive). SEM analysis showed that increase of surface roughness with modification.
In this research, thin films of CdO: Mg and n-CdO: Mg/ p-Si heterojunction with thickness (500±50) nm have been deposited at R.T (300 K) by thermal evaporation technique. These samples have been annealed at different annealing temperatures (373 and 473) K for one hour. Structural, optical and electrical properties of {CdO: Mg (1%)} films deposited on glass substrate as a function of annealing temperature are studied in detail. The C-V measurement of n-CdO: Mg/ p-Si heterojunction (HJ) at frequency (100 KHz) at different annealing temperatures have shown that these HJ were of abrupt type and the builtin potential (Vbi) increase as the annealing temperature increases. The I-V characteristics of heterojunction prepared under dark case at
... Show MoreA thin film of (SnSe) and SnSe:Cu with various Cu ratio (0,3,5 and 7)% have been prepared by thermal evaporation technique with thickness 400±20 nm on glass substrate at (R.T). The effect of Cu dopants concentration on the structural, morphological, optical and electrical properties of (SnSe) Nano crystalline thin films was explored by using X-ray diffraction (XRD), scanning electron microscopy (SEM), atomic force microscopy (AFM), energy dispersive spectroscopy (EDS), UV–Vis absorption spectroscopy and Hall Effect measurement respectively. X-ray diffraction analysis reveal the polycrystalline nature of the all films deposited with orthorhombic structure which possess a preferred orientation along the (111) plane. The crystalline sizes o
... Show MoreThe huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed a great competence of the proposed WELM compared to the ELM.
The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More