إحدى أهم الطرق لتقصي توزيع المجرات عبر الزمن الكوني هي دالة اللمعان LF بدلالة كتلة القرص الباريوني ψS(Mb)، القدر . لقد درسنا تقديرًا لكثافة كتلة الباريون في عينة من المجرات الحلزونية القضيبية وغير القضيبية من الادبيات السابقة، والتي تتضمن فعليًا، لكل صنف من الاجرام السماوية ذات المحتوى الباريون المرئي، جزءًا لا يتجزأ من ناتج دالة الضيائية (LF) ونسبة الكتلة إلى الضوء. استخدمت تقنية الانحدار المتعدد لحزمة الب
... Show MoreAbstract
The target derivative are gentamicin linked with L-Val- L-Ala by an ester linkage. These were synthesized by esterification method, which included the reaction of -OH hydroxyl group on (carbon No.5) of gentamicin with the acid chloride of the corresponding dipeptide, The preparation of new derivative of gentamicin involved protected the primary & secondary amine groups of Gentamicin, by Ethylchloroformate (ECF) to give N-carbomethoxy Gentamicin which was used for further chemical synthesis involving the free hydroxyl groups.
Then prepared dipeptide (L-Val- L-Ala) by conventional solution method in present DCC & HoBt then reacted with thionyl
... Show Moret. The current study was conducted on the umbilical cord blood of newborns in the Banks Hospital in Baghdad, Diyala, and Khalis in Diyala, where the study included 90 samples of blood, and samples were collected for the period from the 1st of October;2020 to The first of February;2021 AD, where the study included measuring levels of interleukin-6;Adiponectin,glucose and bilirubin in the blood, comparison study between the study variables with the child's weight (greater than 3 kg),(less or equal 3 kg),the mother's age (greater than 25 years, less or equal to 25 years),the sex of the child (male, female).The results of our study showed that there were no significant differences between the variables of the current study between the two sex
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe purpose of this paper is to give the definition of projective 3-space PG(3,q) over Galois field GF(q), q = pm for some prime number p and some integer m.
Also, the definition of the plane in PG(3,q) is given and state the principle of duality.
Moreover some theorems in PG(3,q) are proved.
Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show More