Some metal ions (Mn+2, Co+2, Ni+2, Cu+2,Zn+2 and Cd+2) complexes of quodridentats Schiff base derived from (2-hydroxy benzaldehyde and 4,4'-methylenedianiline as primary ligand and 3-picoline (3-pic) secondary ligand have been synthesized and characterized on the basis of their 1H ,13C-NMR, FT-IR, UV-Vis spectroscopy, conductivity measurements, elemental analysis, and magnetic moments, metal to ligands ratio in all complexes has been found to be (1:1:2) (M:Schiff base:3-pic), Schiff base behaves as neutral tetra dentate ligand with (N2,O2) system from the results obtained, the following general formula has suggested for the prepared complexes [M+2(2-mbd)(3-pic)2] and octahedral stereochemistry, Where M+2 = (Mn , Co , Ni , Cu , Zn and Cd), 2-mbd = 2,2'-(1E,1'E)-(4,4'-methylene bis (4,1-phenylene ) bis (azan-1-yl-1-ylidene) bis(methan-1- yl-1-ylidene)diphenol (2-mbd), 3-pic = 3-picoline.
Hierarchical temporal memory (HTM) is a biomimetic sequence memory algorithm that holds promise for invariant representations of spatial and spatio-temporal inputs. This article presents a comprehensive neuromemristive crossbar architecture for the spatial pooler (SP) and the sparse distributed representation classifier, which are fundamental to the algorithm. There are several unique features in the proposed architecture that tightly link with the HTM algorithm. A memristor that is suitable for emulating the HTM synapses is identified and a new Z-window function is proposed. The architecture exploits the concept of synthetic synapses to enable potential synapses in the HTM. The crossbar for the SP avoids dark spots caused by unutil
... Show MoreIn the present investigation, 24 adult dipteran species with forensic importance belonging to 13 genera and 8 families that were collected from different localities of Iraq. The specimens were identified by different taxonomical keys; in addition the date and localities of collecting specimens were recorded.
Polyaniline (PANI) has been prepared by the oxidation method in order to fabricate it with various concentrations of copper nanoparticles (CuNPs) which produced using the reduction method. Various techniques have characterized pure PANI and PANI doped CuNPs composites, such as fourier transform infrared spectroscopy (FT-IR), X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FE-SEM) and energy dispersive X-ray spectroscopy (EDS), which were provided important information about the structure and morphology of the fabricated polymer nanocomposites. The properties of dielectric permittivity (έ), dielectric loss (ἔ) and electrical conductivity (σ_AC) properties were studied at room temperature versus a range
... Show Moreتعد الرماية واحدة من الألعاب التي يقاس مستوى الانجاز فيها بالأرقام إذ ارتفعت الأرقام المسجلة بالنسبة لسلاح المسدس الهوائي حتى وصلت عند بعض الأبطال العالميين إلى الانجاز النهائي ، وقد لجأ المدربون إلى مختلف الطرق التدريبية, وان ضعف الثبات والتركيز هما اللذان يقودان إلى هبوط مستوى الانجاز في الرماية ، ولتحقيق التركيز والثبات المطلوبين أثناء الرمي يجب التدريب على مطاولة حمل السلاح التي تعد من أصعب تدريبات الر
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIntervention in International Relations from the concepts that are still highly
controversial among those he considers a breach of international law and the UN Charter and
in violation of the rule , and those who felt that the need provided, however, that this is linked
motives humanity recognized by the international community , because the international
variables proved the inadequacy of the principle of non-interference and the principle of
sovereignty as the traditional variables international , and therefore most of the international
practice came a bus with many of the behaviors that reflect a decline in its entirety to these
principles , and became adapt these principles with international reality is too compl