In this study, we prove that let N be a fixed positive integer and R be a semiprime -ring with extended centroid . Suppose that additive maps such that is onto, satisfy one of the following conditions belong to Г-N- generalized strong commutativity preserving for short; (Γ-N-GSCP) on R belong to Г-N-anti-generalized strong commutativity preserving for short; (Γ-N-AGSCP) Then there exists an element and additive maps such that is of the form and when condition (i) is satisfied, and when condition (ii) is satisfied
This work involves the preparation of the ligand [KL] :- ÂÂÂÂÂÂ
K[4-(N-(5-methylisoxazol-3-yl) sulfamyl) phenylcarbamodithioate] from the reaction of sulfamethoxazole with Carbon disulfide in the presence of potassium hydroxide under reflux (4 hours) using methanol as asolvent. The prepared ligand was characterized using FT-IR, UV-Vis, 1H,13C–NMR spectroscopy, molar conductivity and melting point, Complexes for the above ligand [KL] with some bivalent transition and non-transition metals (Mn +2, Co+2 , Ni+2 ,
... Show More In this paper,we construct complete (kn,n)-arcs in the projective plane PG(2,11), n = 2,3,…,10,11 by geometric method, with the related blocking sets and projective codes.
A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.
The title compound was synthesized by 2:1 condensation between adamantan-1-ylamine and benzene-1,4- dicarbaldehyde in n-BuOH and produced a good yield 87% of new bis Schiff base. The compound skeleton was affirmed by FTIR, 1H NMR, LC-MS, and X-ray powder diffraction. The structure was solved by a parallel tempering process and refined by using Rietveld refinement. Two adamantan-1-ylimino groups are connected in the anti-positions to the planar central 1,4-dimethylbenzene group. All rings of the adamantyl group possess normal chair conformation.
The N-[(2,3-dioxoindolin-1-yl)-N-methylbenzamide] was prepared by the reaction of acetanilide with isatin then in presence of added paraformaldehyde, the prepared ligand was identified by microelemental analysis, FT.IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following selected metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio, yielded a series of complexes of the general formula [M(L)2Cl2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). From the obtained data the octahed
... Show MorePoly [N-(1, 3-thiazo-2yl)]maleamic acid synthesized from corresponding monomer N-(1, 3-thiazo-2yl)maleamic acid (NTM) by using the process of electrochemical polymerization in aqueous solution at room temperature. The structure of the polymeric layer generated on the surface of (Low Carbon Steel (L.C.S)) (working electrode) was investigated by Fourier Transmission Infrared [FT-IR] and a scanning electron microscope [SEM]. The anticorrosion ability of a polymeric layer on low carbon steel (L.C.S) was investigated using a method of electrochemical polarization at temperatures ranging from (293 to 323) K, in a 3.50 percent NaCl solution. The activation parameters, both kinetic and thermodynamic for the L.C.S corrosion process were
... Show MoreThe adsorption behavior of Bismarck brown (BB) dye from aqueous solutions onto graphene oxide GO and graphene oxide-g-poly (n-butyl methacrylate-co-methacrylic acid) GO-g-pBCM as adsorbents was investigated. The prepared GO and GO-g-pBCM were characterized by Fourier transform infrared spectroscopy FTIR, which confirmed the compositions of the prepared adsorbents. Adsorption of BB dye onto GO and GO-g-pBCM was explored in a series of batch experiments under various conditions. The data were examined utilizing Langmuir and Freundlich isotherms. The Langmuir isotherm was seen as increasingly reasonable from the experimental information of dye on formulating adsorbents. Kinetic investigations showed that the experimental data were fitted ve
... Show More
A descriptive study, which was using an assessment approach, was conducted for the
determination of the impact of rheumatoid arthritis and osteoarthritis patient’s functional disability
upon their life style. The study was carried out at the Rheumatology and outpatients clinics of ALKarama
Teaching Hospital, Baghdad Teaching Hospital AL-Kindey Teaching Hospital and Specialized
surgeries Teaching Hospital for the period of October 15th 2003 through May 13th 2004 in Baghdad
City. A purposive (non-probability) sample of (245) arthritis patients which was comprised (111)
rheumatoid arthritis patients and (134) osteoarthritis patients, was selected out of the early stated
settings. The questionnaire was comprised of
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More