Oxazine and quinazoline has a very important in organic chemistry especially in hetero cyclic fields. this research consist the preparation of 4H,4'H-2,2'-bibenzo[d][1,3]oxazine-4,4'-dione compound (1) from di acid chloride with 2-aminobenzoic acid in pyridine as solvent to give compound (2) 3,3'-diamino-2,2'- biquinazoline-4,4'(3H,3'H)-dione .compound 2 include free amino group .this compound was reacted with maleic and phthalic anhydride for synthesized of cyclic imide compounds (3,4).another reaction for compound 2 with some substituted aromatic aldehyde for prepared of some novel Schiff bases (5-9) contains quinazoline ring. compound 1 was treated with sulfathiazole and sulfadiazine for synthesized of sulfa compounds contains sulf
... Show MoreBreast cancer is the commonest cancer affecting women worldwide. Different studies have dealt with the etiological factors of that cancer aiming to find a way for early diagnosis and satisfactory therapy. The present study clarified the relationship between genetic polymorphisms of BRCA1 & BRCA2 genes and some etiological risk factors among breast cancer patients in Iraq. This investigation was carried out on 25 patients (all were females) who were diagnosed as breast cancer patients attended AL-Kadhemya Teaching Hospital in Baghdad and 10 apparently healthy women were used as a control, all women (patients and control) aged above 40 years. The Wizard Promega kit was used for DNA isolation from breast patients and normal individuals. B
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More4-methylaniline and its Schiff base derivative were intercalated into the Bentonite clay interlayers in a solid state reaction followed by a condensation reaction to produce two organo-clay composites. X-ray diffraction was used to identify the changes in basal spacing of montmorillonite layers which exhibited noticeable alteration before and after the formation of the composites. FT-IR spectra, on the other hand, were utilized for identifying the structural compositions of the prepared materials as well as the formation of the intercalated Schiff base derivative. The surface morphology of the composites was examined by Scanning Electron Microscopy SEM and Atomic Force Microscope AFM, which reflected some differences in the surface of prepa
... Show MoreThe largest use of x-ray in medical by dentists, employers or persons that needed by patients with specific conditions, lead to higher exposure of x-ray that may cause many diseases. In the present work radiography films have been used in evaluating the efficiency of using unsaturated polyester polymer reinforced with lead oxide (PbO) as shield material for medical x-ray devices, many parameters studied like concentration and thickness that they are increasing the attenuation of x-ray in them. The results show that the attenuation of X-ray increasing with concentration of reinforced material and with thickness, and the optical density decreases with increasing concentration from 0% to 50%, we chose 30% as suitable concentration to increase
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show More