Acetophenone sulfamethoxazole and 3-Nitrobenzophenone sulfamethoxazole were prepared from the reaction of sulfamethoxazole with two ketones. The prepared ligands were identified by (C.H.N) analysis and UV-VIS, FT-IR spectroscopic techniques. Metal complexes of the two ligands were prepared in an aqueous alcohol with Zn (II), Mn (II) and Cu (II) ions with a molar ratio1:1. The proposed general formula for the resulting complexes was [ML.CL2.H2O]H2O .The complexes were characterized by (C.H.N) technique , spectroscopic methods ,conductivity, atomic absorption ,magnetic susceptibility measurements and melting point. According to the results obtained, the suggested geometry is to be octahedral for all the complexes.
In solar-thermal adsorption/desorption processes, it is not always possible to preserve equal operating times for the adsorption/desorption modes due to the fluctuating supply nature of the source which largely affects the system’s operating conditions. This paper seeks to examine the impact of adopting unequal adsorption/desorption times on the entire cooling performance of solar adsorption systems. A cooling system with silica gel–water as adsorbent-adsorbate pair has been built and tested under the climatic condition of Iraq. A mathematical model has been established to predict the system performance, and the results are successfully validated via the experimental findings. The results show that, the system can be operational
... Show MoreBackground: Chronic suppurative otitis media (CSOM) is the result of aninitial episode of acute otitis media and is characterized by a persistent discharge from the middle ear through a tympanic perforation for at least 2 weeks duration. It is an important cause of preventable hearing loss, particularly in the developing world.Methods. 1. To get an overview on the bacterial ear infection profile in general 2. To assess the antibiotic resistance of Pseudomonal infection (PS) particularly since it is usually the commonest infection to cause otitis media and the most difficult to treat due to the problem of multi drug resistance... A cross sectional study was done which included 405 patient of CSOM patients196 (48%) case were males ,209 (52
... Show MoreLinear motor offers several features in many applications that require linear motion. Nevertheless, the presence of cogging force can deteriorate the thrust of a permanent magnet linear motor. Using several methodologies, a design of synchronous single sided linear iron-core motor was proposed. According to exact formulas with surface-mounted magnets and concentrated winding specification, which are relying on geometrical parameters. Two-dimensional performance analysis of the designed model and its multi-objective optimization were accomplished as a method to reduce the motor cogging force using MAXWELL ANSYS. The optimum model design results showed that the maximum force ripple was approximatrly reduced by 81.24%compared to the origina
... Show MoreThis paper presents a nonlinear finite element modeling and analysis of steel fiber reinforced concrete (SFRC) deep beams with and without openings in web subjected to two- point loading. In this study, the beams were modeled using ANSYS nonlinear finite element
software. The percentage of steel fiber was varied from 0 to 1.0%.The influence of fiber content in the concrete deep beams has been studied by measuring the deflection of the deep beams at mid- span and marking the cracking patterns, compute the failure loads for each deep beam, and also study the shearing and first principal stresses for the deep beams with and without openings and with different steel fiber ratios. The above study indicates that the location of openings an
the appearance and increasing of the young immigration within 2015, the researcher intuition as a mother and part of the society, and the role of the psychological attitude in enabling the individual to make decision, in the light of all the above come up the need for studying this problem.
The study aims at finding out:
1. The mental strain of the study sample.
2. The differences in mental strain of the study sample according to the gender, specification, the university, the study (private, not private), and if they have immigrated friends or relatives out of the Iraq.
3. The study sample attitudes towards immigration.
4. The study sample levels of attitudes towards immigration.
5. The differences in the sample attitud
Although allowable amounts of glycol contamination in diesel engine oil, no research has been conducted on how these levels and varying loads affect engine performance. The research used a four-stroke diesel engine to investigate the effect of different glycol contamination levels (0, 120, and 220 ppm) under two engine loads (4.5 and 9 kW). Brake specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature were measured to determine the engine performance. The experiment used the factorial arrangement in a completely randomized design (CRD) with three replicates. Increasing the contamination levels from 0 to 120 and then to 220 ppm under constant engine load significantly increased brake specific fuel con
... Show MoreResearchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the