This study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass, elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all complexes of the (Cr3+, Co2+, Cu2+). conductivity measurement shows that of the prepared (Co2+, Cu2+) complexes were non electrolyte but (Cr3+) complexes were electrolyte. The parameters of thermodynamic, activation energy Ea , enthalpy ΔH, entropy ΔS and Gibbs free energy ΔG were calculated using Coats-Redfern method by the TGA curve. The bioactivity of the prepared (LH2) and its complexes have been examined with antibacterial activity which shows significant activity against some fungi and bacteria.
The research work was conducted to investigate the effect of oral administration of aqueous extract of turmeric at doses of (5, 10) mg/kg body weight for two weeks daily by determining the genotoxic effect (mitotic index), evaluation of immunological effect (IgG, IgM, IgA, C3, C4) and measuring fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) levels with histological examinations of female albino swiss mice ovaries in comparison with control (normal saline). A clear effect in increasing mitotic activity was reveled for both doses in comparison with control. Results also showed a significant increase in the value of all immunological parameters at both doses, in comparison with control. Also, obvious raise was se
... Show MoreABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the
... Show MoreThe researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength. As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is an emerging zoonotic disease caused by the new respiratory virus SARS-CoV2. It has a tropism in the lung tissues where excess target receptors exist. Periostin plays a role in subepithelial fibrosis associated with bronchial asthma. Since the Coronavirus's target is the human respiratory system, Periostin has been recently described as a valuable new biomarker in the diagnosis and evaluation of disease in patients with COVID-19 lung involvement. Objectives: To assess the level of Periostin in the serum of COVID-19 patients and to correlate its role in disease severity and prognosis. Subjects and Methods: Periostin serum levels were measured for 63 patients attending three main COVID
... Show MoreThe reduction of vibration properties for composite material (woven roving E-glass fiber plies in thermosetting polyester matrix) is investigated at the prediction time under varied combined temperatures (60 to -15) using three types of boundary conditions like (CFCF, CCCF, and CFCC). The vibration properties are the amplitude, natural frequency, dynamic elastic moduli (young modulus in x, y directions and shear modulus in 1, 2 plane) and damping factor. The natural frequency of a system is a function of its elastic properties, dimensions, and mass. The woven roving glass fiber has been especially engineered for polymer reinforcement; but the unsaturated thermosetting polyester is widely used, offering a good balance of vibration p
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThe base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the