Coupling reaction of 4-aminoantipyrene with 8-hydroxyqunoline gave the new bidentate azo ligand 5-(4-antipyrene azo)-8-hydroxyqunoline. Treatment of this ligand with the following metals ions (MnII, CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio yielded a series of neutral complexes of the general formula [M(L)2Cl2]. The prepared complexes were characterized using flame atomic absorption, FT.IR, UV-Vis spectroscopic as well as magnetic susceptibility and conductivity measurements. Chloride ion content were also evaluated by (Mohr Method). From above data, the proposed molecular structure for these complexes as octahedral geometry.
Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil
... Show MoreIn the present investigation, 24 adult dipteran species with forensic importance belonging to 13 genera and 8 families that were collected from different localities of Iraq. The specimens were identified by different taxonomical keys; in addition the date and localities of collecting specimens were recorded.
Polyaniline (PANI) has been prepared by the oxidation method in order to fabricate it with various concentrations of copper nanoparticles (CuNPs) which produced using the reduction method. Various techniques have characterized pure PANI and PANI doped CuNPs composites, such as fourier transform infrared spectroscopy (FT-IR), X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FE-SEM) and energy dispersive X-ray spectroscopy (EDS), which were provided important information about the structure and morphology of the fabricated polymer nanocomposites. The properties of dielectric permittivity (έ), dielectric loss (ἔ) and electrical conductivity (σ_AC) properties were studied at room temperature versus a range
... Show MoreThe study was conducted at research station A, department of field crops, college of agricultural engineering sciences, university of Baghdad during summer 2021 to evaluate the effect of boron and some growth regulators on some growth criteria and yield of soybean crop (cv. shimaa). The experiment was carried out according to split plots by using randomized complete block design with three replications. The main plots included three concentrations of boron (75, 150 and 225) mg.L-1, the sub-plots included three levels of growth regulators, spraying kinetin (100 mg. L-1), spraying ethrel (200 mg.L-1) and spraying kinetin (100 mg.L-1) + spraying ethrel (200 mg.L-1) as
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIntervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl