Two new organotin(IV) complexes Me2Snesc (C1) and Bu2Snesc (C2) have been synthesised from the reaction of the corresponding organotin(IV) chloride with the Schiff base ligand 3,4-dihydroxybenzaldehyde-4-ethylsemicarbazone (H2esc). The ligand was prepared in two steps. The first step includes the formation of 4-ethylsemicarbazide, which then reacted with 3,4-dihydroxybenzaldehyde to give the title ligand. Complex formation between the organotin(IV) moiety and the anionic form of 3,4-dihydroxybenzaldehy-4-ethylsemicarbazone occurred through the o-dihydroxy positions. The ligand and its complexes were characterised by elemental analysis, FT-IR and NMR (1H, 13C and 119Sn) spectroscopy. Accordingly, the complexes were proposed to have tetrahedral geometry. The ligand and its tin(IV) complexes were screened for their antimicrobial activities against some Gram-positive and Gram-negative bacteria. The studies demonstrated that complexation can increase the antimicrobial activity, compared with the free ligand.
Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreBackground: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyz
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license
The characterization and design of this study of new liquid crystals with a V shape compounds containing thiazolidine-2,4-dione and 1,3-phenylene as a core unite with mesophase properties were reported. Preparation and characterization of chloroacetic acid, water, and thiourea to produce thiazolidine-2,4-dione [I] in the presence of strong hydrochloric acid. The 4-hydreoxybenzaldehyde and n-alkyl bromide were reacted with potassium hydroxide to create the n-alkoxy benzaldehyde., then the compound [I] reacted with [II]n in presence of piperidine to produce compounds [III]n. Also, converted resorcinol to a corresponding compound [IV] by refl
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThe base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the