We found that 4,5- diphenyl- 3(2- propynyl) thio- 1??-triazole [1? forms a complex with Pd (11) ion of ratio 1:1 which absorbs light in CH2CI2 at 400 nm, and 4,5- diphenyl- 3(2- propenyl) thio- 1,2,4- triazole [II] forms complexes with Pd (II) ion of ratio 1:1 which absorbs light at 390 nm, and of ratio 2:1 which absorbs light at 435 nm. On the other hand, we found that the new derivative 4- phenyl- 5( p- amino phenyl) -3- mercapto- 1,2,4- triazole ?111? forms complexes with Cu (II) ion of the ratio 1:1 which absorbs light at 380 nm, with Ni (II) ion of the ratio 3:1 which absorbs light at 358 nm; and with Co (11) ion of the ratio 3.2:1 which absorbs light at 588 nm. The ratio of the complexes were determined by measuring the electronic spectra of the complexes in CH2G2 and (CH^NCHO at different concentrations ofthe ligands and f?xed ' •' of the metal ion in every case, then applying the molar ratio plots on the data. Our results were confirmed by precipitating most ofthe above complexes in solid state, and then each complex was analyzed elementally.
Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreMicro wind turbines are generally used in remote locations, and it is difficult and expensive to repair faults which forced the need for condition monitoring and fault diagnosis which has not been used extensively for small turbines. The possibility of utilizing Fast Fourier Transform (FFT) for diagnosis the faults of broken rotor bar in squirrel cage induction motor of a micro wind turbine was investigated. Monitoring and analysis the current spectrum can be effective for diagnosis the early stage of faults and avoid complete catastrophic failure in the motor by powerful virtual instruments and LabVIEW software as an integral part of this instrumentation. Combination advanced signal processing technique with computerized signal processi
... Show MoreFacing the receiver (critic) problematic understanding of modern art done, which turned positive professional image to symbolic language, which gave it authenticity previous Arts advantage, and this latest progress in critical reading contemporary and several mechanisms for analyzing literary texts and plastic, including textural fabric. And we suffer from the absence of cash the recipient culture (learner), so the current search goal focused on detecting structural mechanisms formative (Goldman) reading done modern art and its role in raising criticism knowledge (learner). Defining the theoretical framework of chapter II by discussing it; the first episode dealt with the textural fabric, while the latter was accomplished Studio talk, an
... Show MoreDensely deployment of sensors is generally employed in wireless sensor networks (WSNs) to ensure energy-efficient covering of a target area. Many sensors scheduling techniques have been recently proposed for designing such energy-efficient WSNs. Sensors scheduling has been modeled, in the literature, as a generalization of minimum set covering problem (MSCP) problem. MSCP is a well-known NP-hard optimization problem used to model a large range of problems arising from scheduling, manufacturing, service planning, information retrieval, etc. In this paper, the MSCP is modeled to design an energy-efficient wireless sensor networks (WSNs) that can reliably cover a target area. Unlike other attempts in the literature, which consider only a si
... Show MoreThis research aims to Measurement provide the service from Two perspectives The first perspective Service Provider (doctors) and the second recipient of the service (patients) in Numan General Hospital, and represented the research problem in perceptions of medical staff in the hospital assigned to them responsibility by providing superior services satisfy customers, and how they maintained ready to assist customers and provide services that exceed their perceptions of these services through the use of the developer scale by (Frimpong and Wilson, 2012), includes orientation to provide the service scale four dimensions (Internal cooperative behaviors, service Competence, Service Responsiveness and Enhanced service) and includes do
... Show MoreChickenpox is a viral disease caused by a virus called varicella zoster (VZ). Chickenpox cases were counted in Al-Dora city (southern Baghdad). Data of disease was obtained from the records of Bilat Al-Shuhadaa health center at the period from January to July 2012. Diagnosis of cases was achieved by the physicians of the health center. Studied risk factors were including the gender, address, school and age. Total of cases recorded was 73cases (66.9 per 100,000) populations for seven months. Males reported cases were 48 (65.7%) while female’s cases were 25(34.3%). The highest reported cases were signed in Al-Mhdia-1 sector (24.6%).Also highest reported cases were signed in Al-Mhdia primary school (17.8%). Most VZ cases were reported in
... Show MoreTo evaluate the toxicity of benzalkonium chloride in aquaculture, the hemato-serological indices of Nile tilapia Oreochromis niloticus are used as biomarkers. Following exposure to three concentrations of benzalkonium chloride BAC 0.1, 0.25, 0.50, and 1 mg/l (BAC1,2,3 and 4) in aquaria for two durations 21 and 42 days, the microbiological assay in fish aquaria, in addition to blood parameters were assessed. Except for the mean difference between BAC2 and BAC3 (P > 0.05) at 42 days, the mean values of the bacterial counts revealed a significant difference between all compared groups (0.05 ≥ P ≤ 0.01). Following exposure to the lower concentrations of BAC (1, 2 and 3), the main blood parameters of Oreochromis niloticus namely red bl
... Show More