A new ligand [N-(4-nitrobenzoylamino)-thioxomethyl] phenylalanine is synthesized by reaction of 4-nitrobenzoyl isothiocyanate with phenylalanine (1:1). It is characterized by micro elemental analysis (C.H.N.S.), FT-IR, (UV-Vis) and 1H and 13CNMR spectra. Some metals ions complexes of this ligand were prepared and characterized by FT-IR, UV-Visible spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From results obtained, the following formula [M(NBA)2] where M2+ = Mn, Co, Ni, Cu, Zn, Pd, Cd and Hg, the proposed molecular structure for these complexes as tetrahedral geometry, except copper and palladium complexes are have square planer geometry.
In this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t
... Show MoreThe current study is designed to achieve the goal of early detection of heart disease because it is the main risk of death. Some biomarkers were measured as well as the percentage of the effect of certain risk factors in people with myocardial infarction and heart failure. The study included 40 serum samples from people with heart disease. The effectiveness of the creatine kinase (CK-MB), as well as its temporal and albumin effects, as well as sodium ions in people with myocardial infarction and heart failure, were compared with the control group. as shown below:
-The first group consisted of 25 blood samples from people with myocardial infarction and 15 serum samples from people with heart failure. Blood
... Show MoreContracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS-1 (rD
... Show MoreContracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThe base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the