In this research, the theme for employing a simple and sensitive method is to employ a new Schiff base ligand (N’-(4- (dimethyl amino) benzylidene)-3, 5-dinitrobenzohydrazide) to estimate Ni (II) to form orange complex (N-(4-(dimethyl amino) benzylidene)-3, 5-dinitrobenzohydrazide nickel (II) chloride) in acid medium (hydrochloric acid), it gives an absorption peak at the wavelength 485 nm. The preferred conditions were studied to form the complex and obtain the highest absorbance including concentration of Schiff base ligand, the best medium for complex formation, effects of addition sequence on complex formation, the effect of temperature on the absorbance of the complex formed, and the setting time of the formed complex. The obtained r
... Show MoreActivated carbon derived from Ficus Binjamina agro-waste synthesized by pyro carbonic acid microwave method and treated with silicon oxide (SiO2) was used to enhance the adsorption capability of the malachite green (MG) dye. Three factors of concentration of dye, time of mixing, and the amount of activated carbon with four levels were used to investigate their effect on the MG removal efficiency. The results show that 0.4 g/L dosage, 80 mg/L dye concentration, and 40 min adsorption duration were found as an optimum conditions for 99.13% removal efficiency. The results also reveal that Freundlich isotherm and the pseudo-second-order kinetic models were the best models to describe the equilibrium adsorption data.
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreThis paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closedloop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadin
... Show MoreIn this paper Volterra Runge-Kutta methods which include: method of order two and four will be applied to general nonlinear Volterra integral equations of the second kind. Moreover we study the convergent of the algorithms of Volterra Runge-Kutta methods. Finally, programs for each method are written in MATLAB language and a comparison between the two types has been made depending on the least square errors.
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Background Parkinson’s disease (PD) is a common neurodegenerative disease that is linked to several motor and nonmotor symptoms, including sleep disturbances. Patient quality of life has been shown to be disproportionally impacted by disease. Objectives To investigate sleep quality among individuals with PD, and to assess the severity of sleep disturbances and their impact on daytime activities. Subjects and methods A case‒control with 44 patients with Parkinson’s disease and 80 apparently healthy control participants was recruited from several hospitals and clinics. Each participant provided a thorough medical history and underwent a physical examination, and a questionnaire comprising the standard PSQI was used to assess sleep qua
... Show MoreAcute lymphoblastic leukemia (ALL) is a cancer of the blood and bone marrow (spongy tissue in the center of bone). In ALL, too many bone marrow stem cells develop into a type of white blood cell called lymphocytes. These abnormal lymphocytes are not able to fight infection very well. The aim of this study was to investigate possible links between E3 SUMO-Protein Ligase NSE2 [NSMCE2] and increase DNA damage in the childhood patients with Acute lymphoblastic leukemia (ALL). Laboratory investigations including hemoglobin(Hb) ,white blood cell (WBC) , serum total protein , albumin ,globulin , in addition to serum total antioxidant activity (TAA) , Advanced oxidation protein products(AOPP) and E3 SUMO-Protein Ligase NSE2[NSMCE2]. Blood samples
... Show More