A study of the emission spectra of isotopic for electronic states has been carried out. The energies of the vibration levels ( =0,1,..25) and the values of spectral lines R(J) and P(J) versus rotational quantum number (J=0,1..25). It was found that were an increase of the value of R(J) with the increase of the values of J was found while the value of P(J) decreases with decreasing of the values of J . It was found that corresponding to R(J) and P(J) the spectral line R(J) increases when the values of m increased.
The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreDespite the G protein-coupled receptors (GPCRs) being the largest family of signalling proteins at the surface of cells, their potential to be targeted in cancer therapy is still under-utilised. This review highlights the contribution of these receptors to the process of oncogenesis and points to some likely challenges that might be encountered in targeting them. GPCR-signalling pathways are often complex and can be tissue-specific. Cancer cells hijack these communication networks to their proliferative advantage. The role of selected GPCRs in the different hallmarks of cancer is examined to highlight the complexity of targeting these receptors for therapeutic benefit. Our
... Show MoreBackground: In the past, an association between Tuberculosis (TB) and Diabetes Mellitus (DM) was widely accepted, today the potential public health and clinical importance of this relationship seems to be largely ignored. The national clinical and policy guidance in the UK on the central of TB, for example, does not consider the relationship with DM.Objectives: To determine the risk of association between diabetes mellitus and pulmonary TB.Methods: A retrospective study conducted in Ibn Zuhr hospital for chest diseases from Jan 2008 – sep 2010 , included in the study 402 patients with TB divided into diabetic & non diabetic, 96 (23.8%) were diabetic while other 306 were TB not diabetic.Results: Risk of TB among DM patients were cle
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables