An attempt to synthesize the benzoimidazol derivatives from the reaction of o-phenylenediamine and benzoic acid derivatives in the presence of ethanol and various ketones under microwave irradiation, 1 , 5 - benzodiazepinum salt derivatives were obtained instead of them. Unexpected reaction was happened for synthesis a new series of benzodiazepinium salt derivatives in a selective yield . The reaction mechanism was also discussed. The new compounds were purified and identified their structures were elucidated using various physical techniques like; FT- IR spectra, micro elemental analysis (C.H.N) and 1H NMR spectra.
The study included 200 samples were collected from children under two years included (50 samples from each of Cerebrospinal fluid, Blood, Stool and Urine) from, Central Children Hospital and Children's Protections Educational Hospital. Isolates bacterial were obtained cultural, microscopic and biochemical examination and diagnosed to the species by using vitek2 system. The results showed there were contamination in 6.5% of clinical samples. The diagnosed colonies which gave pink color on the MacConkey agar , golden yellow color on the Trypton Soy agar and green color on the Birillent Enterobacter sakazakii agar and gave a probability of 99% in the vit
... Show MoreGumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More