Various of 2,5- disubstituted 1,3,4-oxadiazole (Schiff base, ?- lactam and azo) were synthesized from 2,5-di (4,4?-amino-1,3,4-oxadiazole which usequently synth-esized from mixture of 4- amino benzoic acid and hydrazine arch of polyphosphorus acid. The synthesized compounds were cherecterized by using some spectral data (UV, FT-IR , and 1H-NMR)
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreAn extensive survey of citrus leaf miner (CLM) , Phyllocnistis citrella Stainton parasites
and predators was conducted during 1998 and 1999 in citrus orchards and nursuries in
Baghdad, Diyala and Wasit .Five eulophid parasites were recorded for the first time on citrus
leaf miner larvae , prepupae and pupae viz. Cirrospilus sp, Pnigalio sp ., Ratzburgiola
incompleta , Tetrasticus sp. and, Neochrysocharis formosa . Parasitism rate was ranged from
15% to 63% Chrysopa carnea , Orius albidipennis , Amblyseius sp . Were observed as
predators on CLM .
Leucine aminopepotidase (LAP)[EC:3.4.11.1] activity has been assayed in (50) serum samples of patients with diabeties naphrophathy D.N (non-insulin dependent diabetic (NIDD) , and (50)serum sample of healthy individuals without any clinically detectable diseases have been as control group. The aim of this study is to measure leucine aminopeptidase activity and partially purifying the enzyme from sera of patients with diabetes nephropathy The results of this study revealed that Leucine aminopeptidase (LAP) activity of nephropathy patient’s serum shows a high signifiacant increase (p < 0.001) compared to that of the healthy subjects.LAP was purified from the serum of patients with diabetes nephropathy by dialysis and gel filtration (Se
... Show MoreIn this investigation a high density polyethylene (HDPE) was used as a substitute to polyvinylchloride in the production of lead acid battery separators. This has been achieved by preparing mixtures of different percentages of the feed materials which include a high density polyethylene (HDPE) locally produced, filler materials such as silica and oils such as dioctylphthalate (DOP) or paraffin which were added to the mixture to improve the final properties of the separator. The materials were compounded by two roll-mills under the same conditions. The following parameters are involved: &nb
... Show MoreThe present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.