This paper presents the synthesis and study of some new mixed-ligand complexes containing nicotinamide(C6H7N2O) symbolized (NA) and phenylalanine (C9H11NO2)symbolized (pheH)] with some metal ions. The resulting products were found to be solid crystalline complexes which have been characterized by :Melting points, Solubility, Molar conductivity. determination the percentage of the metal in the complexes by flame(AAS), magnetic susceptipibility, Spectroscopic Method [FT-IR and UV-Vis]. The proposed structure of the complexes using program , chem office 3D(2006) . The general formula have been given for the prepared complexes : [M(NA)2(phe)]cl M(II): Mn(II) ,Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) & Hg(II)). NA = Nicotinamide= C6
... Show MoreThis paper presents the synthesis and study of some new mixed-liagnd complexes containing nicotinamide(C6H7N2O) symbolized (NA) and phenylalanine (C9H11NO2)symbolized (pheH)] with some metal ions. The resulting products were found to be solid crystalline complexes which have been characterized by :Melting points, Solubility, Molar conductivity. determination the percentage of the metal in the complexes by flame(AAS), magnetic susceptipibility, Spectroscopic Method [FT-IR and UV-Vis]. The proposed structure of the complexes using program , chem office 3D(2006) . The general formula have been given for the prepared complexes :[M(NA)2(phe)]cl M(II): Mn(II) ,Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) & Hg(II) . NA = Nicotinamide= C6H7N2O Phe -
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreSoftware testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing
... Show MoreA simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreWith the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show More