Our goal in this research, some new nucleoside analogues was synthesized. Starting from ?-D glucose which was converted to per acetylated ?-D gluco pyronoside then converted to active from(1-Bromo Sugar (2) as a sugar moiety.The base moiety 2-substituted benzimidazole was prepared from condensation of phenylene diamine with different aromatic aldehydes, which were subjected to amino alkylation via Mannich reaction forming new nucleobase derivatives. Condensation of nucleobase with bromo sugar through nucleophilic substitution of anomeric carbon with nitrogen forming new protected nucleoside analogues then hydrolyzed with sodium methoxide in methanol to obtain our target, the free nucleoside analogues. All prepared compound were identified by FT-IR Spectroscopy and some of them with H1 –NMR and C13-NMR Spectroscopy. The synthesized nucleoside analogues were screened for their antibacterial activity in vitro against four types of bacteria including, Bacillus Staphylococcus, aureus (Gram Positive), E.Coli and Pseudoman as (Gram Negative).Also were screened against four types of Fungi (Aspergines flurs, Aspergillus fumgntnts, Aspergillus niger and pencillum).
The Quantitative high-resolution planktonic foraminiferal analysis of the subsurface section in three selected wells in the Ajeel Oil Field (Aj-8, Aj-12, and Aj-15) in Tikrit Governorate, Central Iraq has revealed that Shiranish Formation deposited in Late Campanian- Latest Maastrichtian age. This formation consists mainly of marly and marly limestone yielding diverse planktonic foraminiferal assemblages and calcareous benthic foraminifera, with a total of 46 species that belong to 23 genera, Three zones and four subzones, which cover the Late Campanian to the Latest Maastrichtian, were identified based on the recorded planktonic foraminifera and their ranges. They are as follows:1. Globotruncana aegyptiaca Zone that dated to be Lat
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThe base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show More