The New Schiff base ligand 4,4'-[(1,1'-Biphenyl)-4,4'-diyl,bis-(azo)-bis-[2-Salicylidene thiosemicarbazide](HL)(BASTSC)and its complexes with Co(II), Ni(II), and Cu(II) were prepared and characterized by elemental analysis, electronic, FTIR, magnetic susceptibility measurements. The analytical and spectral data showed, the stiochiometry of the complexes to be 1:1 (metal: ligand). FTIR spectral data showed that the ligand behaves as dibasic hexadentate molecule with (N, S, O) donor sequence towards metal ions. The octahedral geometry for Co(II), Ni(II), and Cu(II) complexes and non electrolyte behavior was suggested according to the analysis data.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MorePregnancy and delivery are physiological conditions that are marked by abrupt alterations to hormones, immunological and molecular characters. The current study aimed to evaluate oxytocin (OT), prolactin (PRL), cortisol and insulin growth factor-2 (IGF-2) levels as physiological biomarkers; programmed cell death protein-1 (PD-1), programmed cell death ligand-1 (PD-L1),interleukin-6 (IL-6) as immunological biomarkers, and single nucleotide polymorphisms (SNPs; rs53576 and rs2254298) of oxytocin receptor gene OXTR as molecular factors in samples of Iraqi women undergoing caesarean section (CS) and normal delivery (ND). Blood samples were collected from 96 pregnant women at term with ages ranging between 16-43 years. Regarding
... Show MoreAbstract
The experiment has been carried out in the Syrian National Commission of Biotechnology, during the growing season 2018/2019, to study the effect of abiotic stresses (salinity and osmotic stresses) on the activity of some antioxidant enzymes and biochemical traits in Catharanthus roseus. The experiment has been laid according to (CRD) with three replications. The seeds have been sterilized by NaOCl solution (0.5% v/v), then planted on MS medium. Plantlets have been moved to MS medium enriched with NAA (1 mg.L-1) and BA (2 mg.L-1). The callus has been initiated from leaves using MS medium containing NAA (1 mg L-1) and KIN (2 mg.L-1). After 60 days, callus
... Show MoreThe accuracy of the skillful performance of the front and back dimensions of badminton in volleyball, occurs through the investment of complex exercises (physical skills) in a single performance and its characteristics that give the correct movement behavior and speed to the accuracy of the performance of the strokes as well as the identification of changes in some physiological indicators of By using these compound exercises. The research problem lies: I found a weakness in the accuracy of the performance of the front and back dimensions strike and diagnosed this through the tests that it conducted on the players to identify and know the problem, and attributed this weakness to a weakness in the necessary physical and skill abilities and t
... Show MoreIn this research work a composite material was prepared contains a matrix which is unsaturated polyester resin (UPE) reinforced with carbon nanotube the percentage weight (0.1, 0.2, 0.4.0.5) %, and Zn particle the percentage weight (0.1, 0.2,0.4,0.5)%.
All sample were prepared by hand lay-up, process the mechanical tests contains hardness test, wear rate test, and the coefficient of thermal conductivity. The results showed a significant improvement in the properties of overlapping, Article containing carbon nano-tubes and maicroparticles of zinc because of its articles of this characteristics of high quality properties led to an, an increase in the coefficient of the rmalconductivity, and increase the hardness values with increased pe
The experiment was conducted to study the effect of leaves extract of Salvia sclarea , Rosmarinus officinalis and Thymus vulgaris with 10% and 30% concentration on germination of seeds and growth of seedlings . The effect of these extracts on infection percentage of seeds decay and surface growth of Rhizoctonia solani . The results showed that the three extracts effected significantly to reduced percentage of seeds germination, acceleration of germination , promoter indicator , infection percentage of seeds decay and surface growth of R. solani especially in 30% concentration .