ne,؛Stability constants were determined for complexes of amino acids : L-leuc tryptophane and Aspartic acid with thorium (IV ) and uranyle ( U02++) ions at ؛ serine
This research reports an error analysis of close-range measurements from a Stonex X300 laser scanner in order to address range uncertainty behavior based on indoor experiments under fixed environmental conditions. The analysis includes procedures for estimating the precision and accuracy of the observational errors estimated from the Stonex X300 observations and conducted at intervals of 5 m within a range of 5 to 30 m. The laser 3D point cloud data of the individual scans is analyzed following a roughness analysis prior to the implementation of a Levenberg–Marquardt iterative closest points (LM-ICP) registration. This leads to identifying the level of roughness that was encountered due to the range-finder’s limitations in close
... Show MoreIn this paper, the method of estimating the variation of Zenith Path Delay (ZPD) estimation method will be illustrate and evaluate using Real Time Kinematic Differential Global Positioning System (RTK-DGPS). The GPS provides a relative method to remotely sense atmospheric water vapor in any weather condition. The GPS signal delay in the atmosphere can be expressed as ZPD. In order to evaluate the results, four points had been chosen in the university of Baghdad campus to be rover ones, with a fixed Base point. For each rover position a 155 day of coordinates measurements was collected to overcome the results. Many models and mathematic calculations were used to extract the ZPD using the Matlab environment. The result shows that the ZPD valu
... Show MoreThe aim of this study was investigating the correlation between elevation of Prolactin levels and the increase of the concentrations of total sialic acids. The study was performed on 149 women consisted of 93 infertile hyperprolactinimic women (patients), age ranged16-38 years old, and 56 normoprolactinemic women as a control group, 18-37 years old. Serum prolactin (PRL) and gonadotroph hormones (Follicle stimulating hormone FSH and Luteinizing hormone LH) were measured using enzymatic immunoassay (EIA) method, resorcinol method for serum total sialic acids (SIA). Patients were divided into four groups, each group represented the level of prolactin of infertile women as follow: G1= (21-30), G2= (31-40), G3= (41-50), and G4= (51-60) ng/mL. S
... Show MoreTwo ligand ortho-amino phenyl thio benzyl (L1) and 1,3 bis (ortho - amino phenyl thio ) acetone (L2) and their complexes have been prepared and characterized . The L1 ligand is lossing phenyl group on complexcation and forming 1,2 bis (ortho - amino phenyl thio ) ethane L3 and this tetrahedrally coordinated to the metal ion ( M+2 = Ni , Cu , Cd ) and octahedrally coordinated with mercury and cobalt ions , while the ligand L2 is behave as tridentate ligand forming octahedrally around chrome metal ion . Structural , diagnosis were established by i.r , Uv- visible , conductivity elemental analysis and (mass spectra , H nmr spectra for( L1 , L2 ) .
This study describes the preparation of a new bidentate Schiff base derived from the condensation of Isatin-3-hydrazone with 2-acetylthiophene and the preparation of new series of complexes with a good yield. The prepared ligand was characterized by IR, UV-Vis, C.H.N.S elemental analysis, 1H and 13C NMR, LC-Mass spectroscopy, and physical measurements. Its complexes were analyzed by C.H.N.S elemental analyses, UV-Vis., FTIR, NMR, LC-Mass Spectra, atomic absorption spectroscopy, magnetic susceptibility, and conductivity measurements The results from spectroscopy and measurement studies showed that the ligand coordinated to the metal ion as a bidentate ligand via oxygen and nitrogen, forming an octahedral geometry around it. In vitro antimicr
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More