The current research aims to find out the extent to which students of the Faculty of Education for Pure Sciences\/Ibn al-Haitham have owned laboratory academic skills, the researcher adopted a descriptive research approach to conform to the goal of the research, the research sample the consisted of 140 students from the Department of Chemistry Phase II, The research tool, which consisted of a measure of laboratory academic skills, which consisted of seven skills and consisted of 28 paragraphs (four paragraphs per field), was prepared and the pent-up scale was chosen because the selected sample were university students, and the results showed the ownership of students' skills of laboratory academic skills other than skill The use of the libr
... Show MoreA particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.
Graphite coated electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Glibenclamide (Glb). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by radical bulk polymerization using (Glb.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using (AA) and (AAm) showed a near nernstian response with slopes o
... Show MoreDespite their long successful use, synthetic dyes have several problems due to their carcinogenic and toxic effects. Besides providing bright colors, some natural pigments have shown notable antimicrobial activity; thus, they could be utilized as functional dyes in many applications such as making colored antimicrobial textiles. In this work, a yellow pigment produced by Streptomyces thinghirensis AF7 and has a notable antimicrobial activity was used to produce a colored antimicrobial textile. The extracted yellow pigment was subjected to a purification step using silica gel column eluted with di ethyl ether solvent. The FTIR, GC-MS and NMR analysis showed that the colorings in this type of product are due to t
... Show MoreThe mineralogical study using X-ray diffraction (XRD) supported by scanning electron microscopic (SEM) examination and energy-dispersive spectroscopy (EDS) on the claystone of the Kolosh Formation from northern Iraq was conducted to Shows the provenance history of rocks. Chlorite, montmorillonite, illite, palygorskite, and kaolinite were recorded in different amounts in the study area. The association of montmorillonite and chlorite in the claystone of the Kolosh Formation (Paleocene) refers to the marine environment. Chlorite and montmorillonite are the common minerals in the Kolosh Formation with less common of illite, kaolinite and palygorskite. These clay minerals are of authigenic, detrital and diagenetically origin, which
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show More