Many of the elementary transformations of determinants which are used in their evaluation and in the solution of linear equations may by expressed in the notation of matrices. In this paper, some new interesting formulas of special matrices are introduced and proved that the determinants of these special matrices have the values zero. All formulation has been coded in MATLAB 7.
In a survey of the crabronid fauna of Iraq during June to October 2022; 9species belonging to the genus
In this research work, synthesis, antimicrobial and antioxidant bioactivity of a chain of compounds having unsaturated ketones bond and isoxazoline moiety have been described. New chalcone derivatives containing isoxazoline moiety have been synthesized. Generally, Chalcones are unsaturated ketones bearing (-CO-CH=CH-) as reactive ketoethylenic group that give the bright yellow colored compounds due to this chromophore group. Firstly, chalcones (IIa-d) have been prepared by cyclocondensation (Claisen-Schmidt condensation) of triphenyl aminobenzaldehyde with different substituted acetophenone in ethyl alcohol to produce a series of chalcones compounds with bright yellow colored as a
... Show MoreNew hydrazone derivatives of Fenoprofen were synthesized and evaluated for their anti-inflammatory activity by means of egg white induced paw edema method. All the synthesized target compounds were characterized by FT-IR spectroscopy, 1HNMR analysis and by measure of their physical properties. The synthesis of the target compounds(H1-H4) was accomplished by multistep reaction procedures. The synthesized target compounds were show activity in reducing paw edema thickness and their anti-inflammatory effect was comparable to that of the standard (Fenoprofen) except for compound H3 which show anti-inflammatory activity higher than Fenoprofen.
Sixteen new complexes with the general formula [M(L)2(H2O)2] were prepared resulting from the reaction of the two new Schiff base ligands, which are: - L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, mercury) and (tetravalent platinum). Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is linked to the metal ions via the nitrogen atoms are the isomethene group and the oxygen is the hydroxide group of t
... Show MoreThe slums one of the main problem plaguing the city of Baghdad in general and
the unity of municipality of New Baghdad, especially, where the characteristics of the study
area a prominent role in population growth and the emergence of slums where a private,
although the region suffer from the housing crisis is the lack of the number of housing units
compared to the number of families in which, With high land prices and the level of rent
which was accompanied by the absence of the law, which was followed by the year 2003, has
become the study area and one of the most municipalities of the city of Baghdad Contain
slums which took fills abandoned buildings and acquires vacant land agricultural ones and
allocated to d
New mixed ligand complexes of New Schiff base 4,4'- ((naphthalen-1-ylimino) methylene) dibenzene-1,3-diol and 8-hydroxy quinoline: Synthesis, Spectral Characterization, Thermal studies and Biological Activities
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the