In a survey of the crabronid fauna of Iraq during June to October 2022; 9species belonging to the genus
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreIn this paper, a new seven-parameter Mittag-Leffler function of a single com-plex variable is proposed as a generalization of the standard Mittag-Leffler function, certain generalizations of Mittag-Leffler function, hypergeometric function and confluent hypergeometric function. Certain essential analytic properties are mainly discussed, such as radius of convergence, order, type, differentiation, Mellin-Barnes integral representation and Euler transform in the complex plane. Its relation to Fox-Wright function and H-function is also developed.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThe science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt
... Show MoreBackground: Hyperthyroidism refers to overactive of thyroid gland leading to excessive synthesis of thyroid hormones and accelerated metabolism in the peripheral tissue. Objective: The aim of this study is to evaluate a new member of the IL-1 super family of cytokines interleukin-33(IL-33) levels in serum .in order to evaluate its utility as clinical bio marker of autoimmune disease (i.e. hyperthyroidism) Methods: The present study was conducted on 30 patients from the Iraqi female patients with hyperthyroidism attending Baghdad teaching hospital, in addition to 30 healthy controls. All subjects were (35-65) years old. Parameters measured in the sera of patients and healthy groups, were interleukin -33 (IL-33), Thyroxin (T4), Thyroxin (T3)
... Show MorePathogenic microorganisms are becoming more and more resistant to antimicrobial agents. So the synthesis of new antimicrobial agents is very important. In this work, new 5-fluoroisatin-chalcone conjugates 5(a–g) were synthesized based on previous research that showed the modifications of the isatin moiety led to the synthesis of many derivatives that have antimicrobial activity. 4-aminoacetophenone reacts with 5-fluoroisatin to form Schiff base (3), which in turn reacts with two different groups of aromatic (carbocyclic and heterocyclic) aldehydes 4(a–g) separately to form the final compounds 5(a–g). Proton-nuclear magnetic resonance (¹H-NMR) and Fourier-transform infrared (FT-IR) spectroscopy were used to confirm the chemic
... Show MoreHeterocyclic polymers / silica nanocomposite one of important materials because of excellent properties such as thermal , electrical , and mechanical properties , so that hybrid nanomaterial are widely used in many fields, in this paper nanocomposite had prepared by modification of silica nanoparticals by using acrylic acid and functionalized the surface of nanoparticles, and using free Radical polymerization by AIBN as initiators and anhydrous toluene as solvent to polymerize functionalize silica nanoparticles with heterocyclic monomers to prepare heterocylic polymers / silica nanocomposite and study electrical conductivity , The nanocomposite which had prepared characterized by many analysis technique to study thermal properties such
... Show More