The new organic reagent 2-[Benzo thiazolyl azo]-4,5-diphenyl imidazole was prepared and used as complexing agent for separation and spectrophotometric determination of Cu2+ ion in some samples include plants, soil, water and human blood serum. Initially determined all factors effect on extraction method and the results show optimum pH was (pHex=9), optimum concentration was 40?g/5mLCu2+ and optimum shaking time was (15min.), as well stoichiometry study appears the complex structure was 1:1 Cu2+: BTADPI. Interferences effect of cations were studied. Synergism effect shows MIBK gave increasing in distribution ratio (D). Organic solvent effect appears there is no any linear relation between dielectric constant for organic solvent used and distribution ration (D). Thermodynamically found the reaction was Endothermic reaction, with ?Hex= 0.0131 KJ.mole-1,?Gex=-54.20 KJ.mole-1 ,?Sex= 167.84 J.mole-1.Beer’s law was obeyed over the concentration 1-30?g/5mL, and ?=922.90 Lmol-1.cm-1,with detection limit 1.7×10-5and Sandell’s sensitivity 6.8× 10-7 gcm-2.
The aim of this paper, is to study different iteration algorithms types two steps called, modified SP, Ishikawa, Picard-S iteration and M-iteration, which is faster than of others by using like contraction mappings. On the other hand, the M-iteration is better than of modified SP, Ishikawa and Picard-S iterations. Also, we support our analytic proof with a numerical example.
In this study, a simulation model inside a channel of rectangular section with high of (0.16 m) containing two rectangular obstruction plates were aligned variable heights normal to the direction of flow, use six model of the obstructions height of (0.059, 0.066, 0.073, 0.08 and 0.087 m) were compared with the flow behavior of the same duct without obstructions. To predict the velocity profile, pressure distribution, pressure coefficient and turbulence kinetic energy flow of air, the differential equations which describe the flow were approximated by the finite volumes method for two dimensional, by using commercial software package (FLUENT) with standard of k-ε model two dimensions turbulence flow.
... Show MoreIt included the introduction to the research and its importance, as the knee joint is one of the important joints in the human body that are susceptible to injury, and among these injuries is the roughness of the knee that occurs as a result of weakness and imbalance in the work of the quadriceps muscle, so its treatment is through rehabilitation exercises to treat weakness and gain flexibility and strength.Hence the importance of the research by developing rehabilitation exercises with different resistances in the water medium and restoring flexibility and muscular strength for patients with knee roughness for ages from 30-40 years, and the experimental method was used to solve the research problem, and the research sample included (6) of
... Show MoreIn aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MoreBackground: Chronic hyperglycemia causes diabetic nephropathy(DN), which is a typical microvascular complication of type 2 diabetes mellitus. The pathogenesis of DN is not fully understanding. The inflammation may possess a significant role in the progression of DN in diabetic patients. Method: The study accomplished at teaching laboratories of medical city, Baghdad, Iraq. It was included 50uncontrolled diabetic type 2 patients with nephropathy, age range (40-78) years and 42 controlled diabetics type 2 without nephropathy, age range (35 - 52) years as a control group. The participants divided in to two groups according to HbA1c measurement which is described as follows: < 7.5% of HbA1c describes controlled diabetes, and > 9% of HbA1c
... Show MoreBackground: Several studies suggested that skeletal system is adversely affected by diabetes and is associated with increased risk of osteoporosis and fragility fractures
Objectives: The study was a case-control study that designed to assess the level of bone turnover markers (BTMs) among patients with type 2 diabetes mellitus (T2DM) and to investigate the effect of body weight and diabetic control on the level of bone turnover
Type of the study: Cross- sectional study.
Methods: The present study included 100 postmenopausal women with type 2 diabetes mellitus. Sixty-six non-diabetic postmenopausal women were enrolled as a control. Fasting b
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More