A variety of new phenolic Schiff bases derivatives have been synthesized starting from Terephthaladehyde compound, all proposed structures were supported by FTIR, 1H-NMR, 13C-NMR, Elemental analysis, some derivatives evaluated by Thermal analysis (TGA).
The Co(II), Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Proline) and Trimethoprim antibiotic were synthesized. The complexes were characterized using solubility, melting point, conductivity measurement ,. and determination the percentage of the metal in the complexes by flame(AAS).Magnetic susceptibility, Spectroscopic Method [FT-IR and UV-Vis]. Draw the proposed structure of the complexes using program , Chem. office 3D(2006). The ligands and there metal complexes were screened for their antimicrobial activity against four bacteria (gram + ve) and (gram-ve){Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Bacillus}.The proposed structure of the complexes using program , Chem office 3D(20
... Show MoreThe Co(II), Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Proline ) and Trimethoprim antibiotic were synthesized. The complexes were characterized using solubility, melting point, conductivity measurement ,. and determination the percentage of the metal in the complexes by flame(AAS).Magnetic susceptibility, Spectroscopic Method [FT-IR and UV-Vis]. Draw the proposed structure of the complexes using program , Chem. office 3D(2006). The ligands and there metal complexes were screened for their antimicrobial activity against four bacteria (gram + ve) and (gram -ve){Escherichia coli, Pseudomonas aeruginosa, Staphylococcus aureus and Bacillus}.The proposed structure of the complexes using program , Chem office 3D(
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreNowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of
... Show MoreOptoelectronic devices, widely used in high energy and nuclear physics applications, suffer severe radiation damage that leads to degradations in its efficiency. In this paper, the influence of gamma radiation (137Ce source) and beta radiation (90Sr source) on the photoelectric parameters of the Si solar cell, based on the I–V characterization at different irradiation exposer, has been studied. The penetrating radiation produces defects in the base material, may be activated during its lifetime, becoming traps for electron–hole pairs produced optically and, this will, decrease the efficiency of the solar cell. The main objective of the paper is to study and measure changes in the I–V characteristics of solar cells, such as efficienc
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More