M D simulation of Imidazole aqueous solution at 298.15, 303.15 and 308.15 K was carried out by using OPLS force field from this simulation we calculate RDF of N-H… OH2 and N…HOH type of interactions, the results show that the hydration shell around N-H site at 5A0 decade with the increase of temperature and reformed at 10A0, so N site has two conserved hydration shells at approximate 4 and 6A0 respectively these are stable in this temperature range but the order and number of water molecules are varying with temperature specially the hydration shell at 4A0
In this research, the dynamics process of charge transfer from the sensitized D35CPDT dye to tin(iv) oxide( ) or titanium dioxide ( ) semiconductors are carried out by using a quantum model for charge transfer. Different chemical solvents Pyridine, 2-Methoxyethanol. Ethanol, Acetonitrile, and Methanol have been used with both systems as polar media surrounded the systems. The rate for charge transfer from photo-excitation D35CPDTdye and injection into the conduction band of or semiconductors vary from a to for system and from a to for the system, depending on the charge transfer parameters strength coupling, free energy, potential of donor and acceptor in the system. The charge transfer rate in D35CPDT / the syst
... Show MoreWe have studied some types of ideals in a KU-semigroup by using the concept of a bipolar fuzzy set. Bipolar fuzzy S-ideals and bipolar fuzzy k-ideals are introduced, and some properties are investigated. Also, some relations between a bipolar fuzzy k-ideal and k-ideal are discussed. Moreover, a bipolar fuzzy k-ideal under homomorphism and the product of two bipolar fuzzy k-ideals are studied.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreThis research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreActinopolyspora iraqiensis IQ-H1 is a novel strain of actinobacteria isolated from extremely halophilic soil samples in Iraq. The whole-genome sequence of this strain is deposited in the National Center for Biotechnology Information (NCBI) GenBank under the accession number NZ_AICW01000000. In this study, the genome features and the molecular phylogenetic tree of Act. iraqiensis IQ-H1are analyzed. The RAST tool was used for genome annotation. The genomic features were elucidated using QUAST tool. The circular genome map, and the core and pan-genome map of Act. iraqiensis IQ-H1 was generated using CGView and the GView tools respectively. The JSpeciesWS server was used for the tetranucleotide signature analysis a
... Show MoreSpectrophotometric method was developed for the determination of copper(II) ion. Synthesized (2,2[O-Tolidine-4,4-bis azo]bis[4,5-diphenyl imidazole]) (MBBAI) was used as chromogenic reagent at pH=5. Various factors affecting complex formation, such as, pH effect, reagent concentration, time effect and temperature effect, have been considered and studied. Under optimum conditions concentration ranged from (5.00-80.00) µg/mL of copper(II) obeyed Beer`s Low. Maximum absorption of the complex was 409nm with molar absorpitivity 0.127x104 L mol-1 cm-1. Limit of detection(LOD) and Limit of quantification were 1.924 and 6.42 μg/mL, respectively.
... Show MoreThe notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.
The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.