In this research, a Co-polymer (Styrene / Allyl-2.3.4.6-tetra-O-acetyl-β-D-glucopyranoside) was synthesized from glucose in four steps using Addition Polymerization according to the radical mechanism using Benzoyl Peroxide (BP) as initiator. Initially, Allyl-2.3.4.6-tetra-O-acetyl-β-D-glucopyranoside monomer was prepared in three steps and the reaction was followed by (HPLC, FT-IR, TLC), in the fourth step the monomer was polymerized with Styrene and the structure was determined by FT-IR and NMR spectroscopy. The reaction conditions (temperature, reaction time, material ratios) were also studied to obtain the highest yield, the relative, specific and reduced viscosity of the prepared polymer was determined, from which the viscosity average molecular weight was calculated, which amounted to about (63,000 g/mol). Thermal properties of the polymer were studied by Differential Scanning Calorimeter (DSC) and determining the Oxidation Induction Time (OIT).
Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreThis research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreAbstract: Iatrogenic furcal root perforations are serious complications during dental treatment. This study was aimed to compare the sealing ability of new bioceramic root repair material TotalFill® with the other perforation repair materials (GIC, MTA and Biodentine) using a dye- extraction method.Materials and Methods: Forty extracted, human mandibular molars with non-fused well developed root were collected. Artificial perforations were made from the external surface of the teeth. Then the teeth were randomly divided into 4 experimental groups (n= 10) according to the type of repair material used in this study; Medifil glass ionomercement, TotalFill® bioceramic root repair material, BiodentineTM and MTA Plus. The specimens were then im
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
This study investigates the phonotactics of English obstruent clusters in the word-final position from a markedness theory perspective among Iraqi EFL College Students whose native language, Arabic, prefers only two-member word-final obstruent cluster as a maximum. The markedness of clusters is measured depending on Iraqi EFL College Students’ utilization of the simplification strategies. This study tries to answer whether or not word-final obstruent clusters are marked or unmarked for Iraqi EFL College Students, and whether or not the markedness of the obstruent cluster increases as to its length. In order to answer these questions, a test has been distributed among 60 Iraqi EFL Fourth-Year College students, Department of English, Colleg
... Show MoreThe research aims to verify the role of the Human Resources Strategic Management (HRSM) in enhancing the strategic success factors for talent (SSFT) in the General Tourism Authority by distributing a questionnaire consisting of (36) paragraphs on an intentional sample represented by the higher departments as it reached (50) and the sample valid for testing was (44) Person and to test the relationships between the two research variables, the researchers used statistical methods represented by (Bartlett test / mean / simple regression coefficient / difference coefficient, alpha- cronbachAch, confirmatory factor Analysis ) through the statistical program (SPSS v.23 & AMOS v.23). In enhancing the factors of success for talent management in the
... Show More