In the cuurent article, the photophysical properties of 3,6-bis(5-bromothiophen-2-yl)-2,5-bis(2-ethylhexyl)-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione were investigated. The visible absorption bands at 527, 558 and 362 nm in propylene carbonate and the compound was found to be fluorescent in solution and in the plastic film with emission wavelengths between 550- 750 nm. The Stokes Shift of P.C., acetonitrile, diethyl ether, Tetrahydrofuran THF, cyclohexane, dibutyl ether, and dichloromethane DCM are 734, 836, 668, 601, 601, 719, and 804 cm-1 in respectively. The Stokes Shift Δ was less in THF and cyclohexane, than the solvents, which indicates that the energy loss is less between the excitation and fluorescence states. The photophysical characterizations were carried out on the compound in different solvents, the compound displays 12 nm red-shift in the absorption maximum in toluene compared with in propylene carbonate P.C, which the λmax was 558 nm in P.C. The compound displays 5 and 10 red-shifts in the absorption maximum in diethyl ether and dibutyl ether respectively. The absorption band is almost insensitive to the polarity of the solvent, showing only a slight red shift from 563 nm in diethyl ether to 569 nm in cyclohexane and also red shift from 558 nm in acetonitrile to 570 nm in toluene , which appreciably red-shifted depending on the polarity of the solvent. The emission maxima of the dye slightly shift more red region, such as DCM and toluene when compared this compound in other solvents. The dye showed a slight red shift ca. 5 nm on moving from the acetonitrile to the less polar solvent, such as dichloromethane DCM.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based
... Show MoreGastroesophageal reflux disease (GERD) is a prevalent clinical condition, that affects millions of individuals worldwide. Objective: To assess the level of soluble HLA-E (sHLA-E) as a biomarker in the diagnosis and immunopathogenesis of GERD patients. Methods: The case-control prospective study included 40 GERD patients who were consulted at the Gastroenterology Unit of AlKindy Teaching Hospital, as along with 40 healthy control subjects. The study period extended from January 2023 to May 2024. Blood was drawn from both groups and serum was separated to assesssHLA-E using a sandwich enzyme-linked immunosorbent assay (ELISA) kit. Results: There was a statistically significant difference in sHLA-E levels between GERD patients and healthy cont
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreThe research aims to identify the availability of some basic competencies that are required to be available to workers in digital agricultural Extension from the point of view of senior management, middle management, and, employees with Post-graduate education degrees, represented by the following: Transition to digital agricultural Extension for sustainable and smart family farms, benefiting from international expertise and experiences in applying for Digital agricultural Extension, preparing and implementing Extension messages through platforms, factors affecting the effectiveness of digital agricultural Extension and its platforms, following up and evaluating the activities and programs of the digital Extension platform. The research pop
... Show MoreNeuroendocrine differentiation has been mentioned in many cancers of non-neuroendocrinal organs, involving the gastrointestinal tract. In contrast, the correlation of focally diffused neuroendocrine differentiation in colorectal adenocarcinoma with neuroendocrine cell hyperplasia has not been somewhat reported. The objective of this research is to study the relationship between neuroendocrine cell hyperplasia and neuroendocrine differentiation in colorectal adenocarcinoma and to find the correlation of neuroendocrine differentiation and VEGF expression with clinicopathological parameters of colorectal adenocarcinoma. Methods employed in the current study were including eighty-one patients with colorectal cancer. Formalin fixed paraffin e
... Show More