New thermally stable aromatic poly(amide-imide)s ( PAI1- PAI4 ) were synthesized from direct polycondensation reaction of Terephthalic acid and Phthalic acid with two new different diamine monomers derivatives of 1,2,4,5-tetracarboxilic benzene dianhydride as a second diacides in a medium consisting of triphenyl phosphite (TPP) in N-methyl-2pyrrolidone (NMP) / pyridine solution containing dissolved calcium chloride CaCl2. The polymerization reaction produced a series of novel poly(amide-imide) in high yield. The new monomers were characterized by FTIR, 1H-NMR spectroscopy. The resulting polymers were typically characterized by means of FT-IR, 1H-NMR spectroscopy, and solubility tests. Thermal properties of the poly(amide-imide)s were also investigated using differential scanning calorimetry (DSC). Data obtained by thermal analysis revealed that these polymers showed very good thermal stability. These polymers were readily soluble in various organic solvents.
In this paper, a new procedure is introduced to estimate the solution for the three-point boundary value problem which is instituted on the use of Morgan-Voyce polynomial. In the beginning, Morgan-Voyce polynomial along with their important properties is introduced. Next, this polynomial with aid of the collocation method utilized to modify the differential equation with boundary conditions to the algebraic system. Finally, the examples approve the validity and accuracy of the proposed method.
This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.
Rwanga (view) movement is a new Kurdish poetry movement. Some poets and modern storywriters published a manifest in 1970. They have made a group of changes in the content and appearance of Kurdish poetry. They were under the influence of western literature schools such as Surrealism, Dadaism and Existentialism. Likewise, the impact of the new Arabic literature that appeared by the end of 1960s on them was obvious as they were imitating such literatures. Nevertheless, the condition of Kurdistan at that time was in need of a new literature to express that new stage. Sherko Bekas was one of those poets who became the dynamo of the poetic movement in which the rebellion spirit was embodied in the modern way of dealing with culture, rhyme, rh
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Green synthesis methods have emerged as favorable techniques for the synthesis of nano-oxides due to their simplicity, cost-effectiveness, eco-friendliness, and non-toxicity. In this study, Nickel oxide nanoparticles (NiO-NPs) were synthesized using the aqueous extract of Laurus nobilis leaves as a natural capping agent. The synthesized NiO-NPs were employed as an adsorbent for the removal of Biebrich Scarlet (BS) dye from aqueous solution using adsorption technique. Comprehensive characterization of NiO-NPs was performed using various techniques such as atomic force microscopy (AFM), Fourier transform infrared (FTIR), X-ray diffraction (XRD), Brunauer-Emmett and Teller (BET) analysis, and scanning electron microscopy (SEM). Additionally, o
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreAbstract
The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's management experience is how to achieve thes
... Show More