There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe search involve the synthesis of some new 1,3-oxazepine and 1,3-diazepine derivatives were synthesized from Schiff base. The Schiff base (VIII) prepared from reaction of aldehyde (IV) derived from L-ascorbic acid with aromatic amine ([2-(4- nitrophenyl)-5-(4-aminophenyl)-1,3,4-oxadiazole] (VII). Oxazepine compounds (IX-XI) were synthesized from the cyclic condensation of Schiff base (VIII) with (maleic, phthalic and 3-nitrophthalic) anhydride, compounds (IX-XI) that were reacted with p-methoxyaniline to give diazepine derivatives (XII-XIV). The structures of the new synthesized compounds have been confirmed by physical properties and spectroscopy measurements such as FTIR, and some of them by 1 H-NMR, 13 CNMR, Mass, and evaluated
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show MoreThirteen morphometric characters of catfish
The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 fro
... Show MoreIn the current study, a novel approach for separating ethanol-water mixture by microbubble distillation technology was investigated. Traditional distillation processes require large amounts of energy to raise the liquid to its boiling point to effect removal of volatile components. The concept of microbubble distillation by comparison is to heat the gas phase rather than the liquid phase to achieve separation. The removal of ethanol from the thermally sensitive fermentation broths was taken as a case of study. Consequently the results were then compared with those which could be obtained under equilibrium conditions expected in an “ideal” distillation unit. Microbubble distillation has achieved vapour compositions higher than th
... Show MoreThe dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreBackground: Atherosclerosis is well known related to age and certain cardiovascular diseases. Aging is one reason of arteries function deterioration which can cause loss of compliance and plaque accumulation, this effect increases by the presence of certain diseases such as hypertension and diabetes disease. Aim: To investigate the reduction of blood supply to the brain in patients with diabetes and hypertension with age and the role of resistive index in the diagnosis of reduced blood flow. Method: Patients with both diseases diabetic and hypertension were classified according to their age to identify the progression of the disease and factors influencing the carotid artery blood flow. By using ultrasound and standard Doppler techniq
... Show MoreThe purpose of this research was to evaluate rice husk functionalized with Mg-Fe-layered double hydroxide (RH-Mg/Fe-LDH) as an adsorbent for the removal of meropenem antibiotic (MA) from an aqueous solution. Several batch experiments were undertaken using various conditions. Based on the results, the optimal Mg/Fe-LDH adsorbent with a pH of 9 and an M2+/M3+ ratio of 0.5 was associated with the lowest particle size (specifically. 11.1 nm). The Langmuir and Freundlich models were consistent with the experimental isotherm data (R2 was 0.984 and 0.993, respectively), and MA’s highest equilibrium adsorption capacity was 43.3 mg/g. Additionally, the second-order model was consistent with the adsorption kinetic results.
The presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two
... Show More
... Show More
Abstract Organic compounds with pyrazole cores have a variety of uses, notably in the pharmaceutical and agrochemical sectors. The interest in creating pyrazole compounds, examining their many features, and looking for potential uses is growing. Our work has concert with synthesis of chalcones and pyrazolines, then finally pyrazoline-aniline derivatives and evaluation their anti-inflammatory, antibacterial and antifungal activities
The presented work includes the Homotopy Transforms of Analysis Method (HTAM). By this method, the approximate solution of nonlinear Navier- Stokes equations of fractional order derivative was obtained. The Caputo's derivative was used in the proposed method. The desired solution was calculated by using the convergent power series to the components. The obtained results are demonstrated by comparison with the results of Adomain decomposition method, Homotopy Analysis method and exact solution, as explained in examples (4.1) and (4.2). The comparison shows that the used method is powerful and efficient.
This paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
Two Schiff bases, namely, 3-(benzylidene amino) -2-thioxo-6-methyl 2,5-dihydropyrimidine-4(3H)-one (LS])and 3-(benzylidene amino)-6-methyl pyrimidine 4(3H, 5H)-dione(LA)as chelating ligands), were used to prepare some complexes of Cr(III), La(III), and Ce(III)] ions. Standard physico-chemical procedures including metal analysis M%, element microanalysis (C.H.N.S) , magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identify Metal (III) complexes and Schiff bases (LS) and (LA). According to findings, a [Cr(III) complex] showed six coordinated octahedral geometry, while [La(III), and Ce(III) complexes]were structured with coordination number seven. Schiff's bases a
... Show MoreThe concept of the order sum graph associated with a finite group based on the order of the group and order of group elements is introduced. Some of the properties and characteristics such as size, chromatic number, domination number, diameter, circumference, independence number, clique number, vertex connectivity, spectra, and Laplacian spectra of the order sum graph are determined. Characterizations of the order sum graph to be complete, perfect, etc. are also obtained.
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreNew Azo compounds containing an 1,8-naphthalimide moiety were synthesized from 1, 8-naphthalic anhydride by a reaction with p-phenylenediamine or benzidine to produce 1,8-naphthalimide derivatives (1 or 2), which were converted to diazonium salt derivatives by using sodium nitrite and acetic acid at 0-5 áµ’C. The diazonium salt was subjected to a coupling reaction with different substituted phenol in alkaline media at 0-5 áµ’c to produce azo compound derivatives (3-14).
The New Azo compound derivatives (3-14) were identified by 1H-NMR, 13C-NMR, and FTIR and by measuring characteristic physical properties and specific reactions. Also, the ability of the prepared azo compounds to work as acid-
... Show MoreIn this paper we offer two new subclasses of an open unit disk of r-fold symmetric bi-univalent functions. The Taylor-Maclaurin coefficients have their coefficient bounds calculated. Furthermore, for functions in , we have solved Fekete- functional issues. For the applicable classes, there are also a few particular special motivator results.
Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreCubosomes are nanosized structures self-assembled nanostructured materials used for controlling the release of the entrapped drug molecule. Lornoxicam (LXM) is a potent analgesic nonsteroidal anti-inflammatory (NSAID) drug with a short half-life (3-4) hours. The present study aims to prepare LXM-loaded cubosomes with well-defined morphology, particle size, PDI, high entrapment efficiency, sustained drug release, and high zeta potential value, as a transdermal drug delivery system.
Twelve formulas of LXM-loaded cubosomal dispersions were prepared by a solvent dilution method using Glyceryl monooleate ( GMO) as polar lipid with different stabilizers as Pluronic® F127 or tween 80 and different types o
... Show MoreThe wake potential and wake phenomena for swift proton in an amorphous carbon target were studied by utilising various dielectric function formalisms, including the Drude dielectric function, the Drude–Lorentz dielectric function and quantum dielectric function. The Drude model results exhibited a damped oscillatory behaviour in the longitudinal direction behind the projectile; the pattern of these oscillations decreases exponentially in the transverse direction. In addition, the wake potential extends slightly ahead of the projectile which also depends on the proton coordinate and velocity. The effect of electron binding on the wake potential, characterised by the ratio to 0.1, has been studied alongside the Drude–Lorentz dielectric
... Show MoreThe research aims to study the corrosion of aluminum alloy(6061) in 0.6 mol. dm-3 NaCl solution in base medium was examined with out and with Gallic acid as environmentally – friendly corrosion inhibitor at temperature range (298-313)K. The inhibitive action of gallic acid on corrosion of aluminum alloy(6061) in KOH solution was examined through electrochemical polarization method using potentiostatic technique and surface analysis by optical microscopy, Polarization measurements indicate that the examined compound act as a mixed type inhibitor. Results appeared that the inhibition occurs through adsorption of the inhibitor molecules on the metal surface and it was obeyed
... Show More