In the cuurent article, the photophysical properties of 3,6-bis(5-bromothiophen-2-yl)-2,5-bis(2-ethylhexyl)-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione were investigated. The visible absorption bands at 527, 558 and 362 nm in propylene carbonate and the compound was found to be fluorescent in solution and in the plastic film with emission wavelengths between 550- 750 nm. The Stokes Shift of P.C., acetonitrile, diethyl ether, Tetrahydrofuran THF, cyclohexane, dibutyl ether, and dichloromethane DCM are 734, 836, 668, 601, 601, 719, and 804 cm-1 in respectively. The Stokes Shift Δ was less in THF and cyclohexane, than the solvents, which indicates that the energy loss is less between the excitation and fluorescence states. The photophysical characterizations were carried out on the compound in different solvents, the compound displays 12 nm red-shift in the absorption maximum in toluene compared with in propylene carbonate P.C, which the λmax was 558 nm in P.C. The compound displays 5 and 10 red-shifts in the absorption maximum in diethyl ether and dibutyl ether respectively. The absorption band is almost insensitive to the polarity of the solvent, showing only a slight red shift from 563 nm in diethyl ether to 569 nm in cyclohexane and also red shift from 558 nm in acetonitrile to 570 nm in toluene , which appreciably red-shifted depending on the polarity of the solvent. The emission maxima of the dye slightly shift more red region, such as DCM and toluene when compared this compound in other solvents. The dye showed a slight red shift ca. 5 nm on moving from the acetonitrile to the less polar solvent, such as dichloromethane DCM.
Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreThe objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.
Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.
Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a
... Show MoreA field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreReseach target the most important topic, is Activity and ProfitabilityIndictors Analysis for
Nationality and Iraqi Insurance Company, In order to stand on them ability to cover its risks
and explore the efficiency asset and its avialible resources using to determine them abilities to
profit generation from its insurance activity. The analysis was focus to examine their profit
and activity power, and test the significant differences aming them performance. Test 2
hypothese that is related and result it sign that the 2 company no has significant differences at
profitability and activity level. The research depend on coneclusion, recommended two
company to work at efficiency with cost element of insurance activity in or
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More