Recent studies have tended to look at Mottagorat texts for seeking more of the information provided by the book for the reader, has been known by several terms Mottagorat texts, including thresholds, including the margins of the text and the parallel texts, and came this difference, according to researchers who ate the subject of research and investigation. Thus, the researchers assert that all these texts must be subjected to provide information even if propaganda of the text. Hence arose the importance of these texts in Informatics scientific material being wrapped body of the text as well as being propaganda material to evoke the recipient to read, and then to the importance of this topic, the search came on five chapters, the first chapter dealt with the researcher and the research problem, which was: What are the signs suggestive texts involved in parallel to the original text, a screenplay? The goal of the present study is to detect signs suggestive texts carried by parallel scenario surrounding the film. Chapter II also included a theoretical framework has been divided on the two themes: First, the parallel nature of the text. And second, sections and types of parallel texts. The third quarter was the search procedures, as was the research methodology is descriptive analytical method, and was the research sample is a scenario that did not (the trial). The fourth chapter is an analysis of the research sample also came fifth chapter of the findings and conclusions, the most important were:fundamental value to create meaning in the title is the font size, color, and location of the space of the interface cover, as it was the title of the research sample demonstrates the substance of the conflict through its sheer size, which, if anything, it shows the magnitude of the disaster suffered by the hero, as well as the font color was red which demonstrates the crime, murder, and others, such as the rise of so authoritarian regime will inevitably be at the expense of the fates of people and blood
In this work, Schiff base ligands L1: N, N-bis (2-hydroxy-1-naphthaldehyde) hydrazine, L2: N, N-bis (salicylidene) hydrazine, and L3:N –salicylidene- hydrazine were synthesized by condensation reaction. The prepared ligands were reacted with specific divalent metal ions such as (Mn2+, Fe2+, Ni2+) to prepare their complexes. The ligands and complexes were characterized by C.H.N, FT-IR, UV-Vis, solubility, melting point and magnetic susceptibility measurements. The results show that the ligands of complexes (Mn2+, Fe2+) have octahedral geometry while the ligands of complexes (Ni2+) have tetrahedral geometry.
A new Macrocyclic Schiff base ligand Bis[4-hydroxy(1,2-ethylene-dioxidebenzylidene) pheylenediamine] [H2L] and its complexes with (Co(II) , Ni(II) , Cu(II) , Zn(II) and Cd(II)) are reported . The ligand was prepared in two steps,in the first step a solution of (o-phenylene diamine) in methanol react under reflux with (2,4-dihydroxybenzylaldeyed) to give an (intermediatecompound) [Bis-1,2 (2,4-dihydroxybenzylediene)pheylinediamine] which react in the second step with (1,2- dichloro ethane) giving the mentioned ligand.Then the complexes were synthesis of adding of corresponding metal salts to the solution of the ligand in methanol under reflux with 1:1 metal to ligand ratio. On the basis of, molar conductance, I.R., UV-Vis, chloride content a
... Show MoreOver the past decades, several studies have examined the subcellular localization of the cauliflower mosaic virus (CaMV) P6 protein by tagging it with GFP (P6-GFP). These investigations have been essential in the development of models for inclusion body formation, nuclear transport, and microfilament-associated intracellular movement of P6 inclusion bodies for delivery of virions to plasmodesmata. Although it was shown early on that the translational transactivation function of P6-GFP was comparable to wild type P6, it has not been possible to incorporate a P6-GFP gene into an infectious clone of CaMV. Consequently, it has not been possible to formally prove that a P6-GFP fusion is comparable in function to the unmodified P6 protein. Here w
... Show MoreA square experimental arena with vegetation on one interior side was deployed in a Sharjah, United Arab Emirates desert. Individual darkling beetles (Coleoptera, Tenebrionidae) Akis subtricostata Redtenbacher, 1850 and Trachyderma philistina Reiche and Saulcy, 1857 were placed inside the arena at temperatures ranging between 27 - 49°C. Whether they chose the vegetated side of the arena or not was recorded, as well as how long it took for them to reach the vegetated side, if they chose it. Both species preferred the vegetated side at all temperatures, and the chance of them choosing the vegetated side increased significantly with increasing temperature (logistic regression, p = 0.0096 and p = 0.0003 for
... Show MoreAim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds w
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show Moreفي هذا البحث تم تحضير المركبات المعدنية النانوية الجديدة لأيونات البلاتين 4+و الذهب 3+ مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين بطريقة الموجات فوق الصوتية. تم تشخيص المعقدات النانوية والليكاند الجديد بأستخدام تقنيات فيزيائية و كيميائية مختلفة مثل أطياف الاشعة تحت الحمراء، حيود الاشعة السينية ، المجهر الالكتروني الماسح ، المجهر الالكتروني النافذ و مجهر القوة الذرية. تم تحديد نشاط مضادات الأك
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show More