Anew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.
A new ligand [N-(3-acetylphenylcarbamothioyl)-4-methoxybenzamide](MAA) was synthesized by reaction of 4-methoxybenzoylisothiocyanate with 3-aminoacetophenone,The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13CNMR spectra, some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MAA)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral
The present study introduces description of new species of leafhopper Cicadella latreilla nov. External morphological characters particularly female genitalia were discussed and illustrated, shape of male abdominal apodeme, chaetotaxy of genital style and genital plate of male genitalia, shape of Aedeagus and connective . The external morphological characters were: spotting patterns of vertex, face, pronotum of prothorax, and metothorax, and of lower and upper valves of ovipositors,shape of female seventh abdominasternum.
A survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.
A new Schiff base [I] was prepared by refluxing Amoxicillin trihydrate and 4-Hydroxy- 3,5-dimethoxybenzaldehyde in aqueous methanol solution using glacial acetic acid as a catalyst. The new 1,3-oxazepine derivative [II] was obtained by Diels- Alder reaction of Schiff base [I] with phthalic anhydride in dry benzene. The reaction of Schiff base [I] with thioglycolic acid in dry benzene led to the formation of thiazolidin-4-one derivative [III]. While the imidazolidin-4-one [IV] derivative was produced by reacting the mentioned Schiff base [I] with glycine and triethylamine in ethanol for 9 hrs. Tetrazole derivative [V] was synthesized by refluxing Schiff base [I] with sodium azide in dimethylformamid DMF. The structure of synthesized compound
... Show MoreA new Schiff base [I] was prepared by refluxing Amoxicillin trihydrate and 4-Hydroxy- 3,5-dimethoxybenzaldehyde in aqueous methanol solution using glacial acetic acid as a catalyst. The new 1,3-oxazepine derivative [II] was obtained by Diels- Alder reaction of Schiff base [I] with phthalic anhydride in dry benzene. The reaction of Schiff base [I] with thioglycolic acid in dry benzene led to the formation of thiazolidin-4-one derivative [III]. While the imidazolidin-4-one [IV] derivative was produced by reacting the mentioned Schiff base [I] with glycine and triethylamine in ethanol for 9 hrs. Tetrazole derivative [V] was synthesized by refluxing Schiff base [I] with sodium azide in dimethylformamid DMF. The structure of synthesized compound
... Show MoreTopology and its applications occupy the interest of many researching centers in the advanced world. From this point of view and because the near open sets play a very important role in general topology and they are now the research topics of many topologists worldwide and its sets doesn’t enter in fibrewise topology yet. Therefore, we use some of the near open sets to be model for introduce results and new spaces in fibrewise topological spaces. Also, there is a very important role of closure operators in constructing a topological spaces, so we introduce a new closure operators on the power set of vertices on graphs and conclusion theorems and new spaces from it. Furthermore, we discuss the relationships of connectedness between some ty
... Show MoreA variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the