In this research, new Schiff base is derived from chitosan O-nitrobenzyldehyde and its complexes were synthesized. All compounds were characterized by FT-IR, UV-Visible, TGA, DTA, TG and molar conductivity with melting point. The results showed that Schiff base was coordinated via nitrogen atom azomethine with the center metal ions Co+2,Ni+2 and Cu+2 behaving monodentate ligand and forming complexes with molecular formula [M(L)Cl2H2O] The tetrahedral geometrical was suggested for all prepared complexes based on the characterization data for all techniques. +2,Cu+2, Ni+2M = Co
Background: Lymphomas are group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and caused the characteristics lymphadenopathy. Occasionally, they may spill over into blood or infiltrate organs outside the lymphoid tissue. The major subdivision of lymphomas is into Hodgkin lymphoma and non–Hodgkin lymphoma and this is based on the histologic presence of Reed-Sternberg cells in Hodgkin lymphoma. Salivary immunoglobulin A is the prominent immunoglobulin and is considered to be the main specific defense mechanism in oral cavity. The aim of this study was to determine the level of salivary immunoglobulin A in lymphoma patients before and after chemotherapy treatment. Subjects, materials and methods: The study i
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreThe Study aims to show the role of Flexible Budget in planning and control The Factory over head.
The study consists four reaserchs the First introduction for the role of Budget in planning and control The second definition Flexible Badget the Third Factory overhed cost variances Analysis The four conclusions and recommendations.
The factory overhead cost represents great ratio from product cost so the management must planning and control on cost Through the year by the Budget of factory over head in the beginning of the year and determind overhead rater.
The topic of the partnership between the public and private sectors with great interest by researchers around the world after making sure that the process of economic and social development depends on a combination of resources and energies and expertise of both the public and private sectors in the creation and operation of the various projects , the economic development of the growing proved the failure of both sectors in achieving greater economic growth Klaaly separately in many countries , especially developing countries with a socialist approach , led one way or another to adopt most of the countries economic reform programs promoted by international organizations and institutions ( such as the IMF and the World Bank ) of i
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMany cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreIn this paper, we introduce the concept of Jordan –algebra, special Jordan –algebra and triple –homomorphisms. We also introduce Bi - –derivations and Annihilator of Jordan algebra. Finally, we study the triple –homomorphisms and Bi - –derivations on Jordan algebra.
In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More