In this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
Enticed by the present scenario of infectious diseases, four new Co(II), Ni(II), Cu(II), and Cd(II) complexes of Schiff base ligand were synthesized from 6,6′-((1E-1′E)(phenazine-2,3-dielbis(azanylidene)-bis-(methanylidene)-bis-(3-(diethylamino)phenol)) (
The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe reaction of 1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one with one equivalent of 4-chlorophenol by coupling reaction afforded (E)-4-((5-chloro-2- hydroxyphenyl)diazenyl)-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one. Then azo ligand was characterize using spectroscopic studies ( FTIR,UV-Vis, 1H and 13CNMR, Mass) also micro-elemental analysiz (C.H.N.O). Transition metal chelation with Co(II), Ni(II), Cu(II), and Zn(II) was investigated, revealing 1:2 metal-to-ligand stoichiometry with octahedral geometry. The biological, and industrial application for the azo ligand and it is complexes were evaluated, demonstrating antimicrobial activity against bacterial and fungal strains, with the Zn(II) complex exhibiting superior inhibition. Additionally,
... Show MoreThe syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S =
... Show MoreThe present research aimed to study the polymorphisms of the chicken insulin-like growth factor 2 (IGF2) in two commercial broiler breeds (Cobb 500 and Hubbard F-15). In total, 300 avian blood samples were obtained. The genomic DNA was isolated using a fast salt-extraction technique. Moreover, polymerase chain reaction (PCR) was used to amplify 1146 bp fragments of the gene. The amplified fragments were subjected to restriction enzyme digestion using the HinfI endonuclease enzyme, and the digested products were separated on a 2% agarose gel. The findings indicated that there were two alleles, T and C, for the target locus, with frequencies of 73.3% and 26.7%, respectively. Three distinct genotype variations, TT, TC, and CC, were found, with
... Show MoreComparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russia
... Show More