A comparison study was made for the reaction of triruthenium carbonyl Ru3(CO)12 with azoarene ArN=NAr . This reaction was monitored in two kinds of solvents , toluene , and n- octane , which yielded new triruthenium carbonyl complex Ru3(μ3-NAr)2(CO)9 . The reactions of azoarenes ArN=NAr with Ru3(CO)12 formed the following trinuclear compound of Ru3((μ3- NAr)2(CO)9 (Ar-C6H4Br-4) in law yield . In addition , to new isomers species of mononuclear cyclometallated of Ru(BrC6H4N-NC6H4NBr-4)2(CO)2 in different percentages . The mechanism of the reaction domenstrates that the formation of trinuclear bis arylimido complexes , and ortho metallated was , the result of cleavage of nitrogen –nitrogen bond . Monitoring this gave evidence that the reaction is preceded faster in presence of n-octane and slowly in presence of toluene . The proposed structure of bis –aryl imido tri-ruthenium complex was based on the results of instrumental analysis .
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreIn this paper, a new seven-parameter Mittag-Leffler function of a single com-plex variable is proposed as a generalization of the standard Mittag-Leffler function, certain generalizations of Mittag-Leffler function, hypergeometric function and confluent hypergeometric function. Certain essential analytic properties are mainly discussed, such as radius of convergence, order, type, differentiation, Mellin-Barnes integral representation and Euler transform in the complex plane. Its relation to Fox-Wright function and H-function is also developed.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis is a contextual study in face and isotope science, and I have made it in one of the terms faces and isotopes, which is the word (bad). Quranic also, and that is at every aspect they mentioned.
The nature of the research required that it be divided into three sections:
The first topic: I singled it out to show the types of contextual connotations.
- The second topic: I singled it out to define the word bad and its meaning.
- The third topic: I devoted it to the study of the word bad and explaining the significance of the Quranic context on the additional meaning and the original meaning.
Conclusion: It mentioned the most important results, which are:
1- The significance of the Quranic context is one of the most impo
In this research has been the manufacture and study the properties of the solar cell type retail hybrid manner thermal evaporation emptiness were studying the properties of the cell at room temperature showed measurements stream circuit behavior linear cell manufacturers reached were calculated efficiency tool cell manufacturers, as well as the expense of workers filling the cell
The current study included the collection of 175 samples of blood (Urea-blood) of patients with rheumatoid arthritis from Al–Al-Kindy Teaching Hospital, Baghdad Teaching Hospital and Al-Imamian Al-Kadhimyain Medical City in Baghdad from both sexes with different ages at the period between 1/10/2016-1/2/2017. Bacterial growth results showed that 80% of urea for bacterial transplantation were positive results, while the number of samples showing no bacterial growth was 20%. The bacterial isolation evaluate for morphological testes and biochemical microscopy, as well as identification by Api system. The highest frequency of inflectional bacteria was E. coli (41.97%), followed by E. cloacae (21.25%), P. aeruginosa (12.5%), Salmonella (10%), K
... Show More