Preferred Language
Articles
/
0xa5xIsBVTCNdQwC293f
Ni (II) and Cd (II) Complexes Derivatives from Heterocyclic Schiff Base; Synthesis, Spectroscopic and Biological Studies
...Show More Authors

Ni and Cd complexes of new Schiff base derived from 5-Amino-2-phenyl-2,4-dihydro-pyrazol-3-one with 4-chlorobenzalaldehyde (A) , 2-Hydroxy-benzalaldehyde (B) and 4-Hydroxy-benzaldehyde (C) have been prepared and characterized by elemental analysis , molar conductivity measurements , FTIR , UV- vis , 1HNMR, mass spectrometer and magnetic susceptibility. Analytical data revealed that six complexes were a distorted tetrahedral geometry and exhibited (1:1) metal :ligand ratio. The biological activity for the three ligands and its complexes were studied

Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Central European Agriculture
Seed priming effect on field emergence and grain yield in sorghum
...Show More Authors

Most cultivars of sorghum have low field emergence as common problem. Three experiments were carried out at Agriculture College, Baghdad University. First experiment was conducted in laboratory according to Complete Randomized Design (CRD) with four replicates. Second and third experiments were conducted at field according to Randomized Complete Block Design (RCBD) during the spring and the fall seasons of 2015, respectively, with four replicates for each one. Same two factors were studied at each experiment. First factor was seed priming by seed soaking for 10 hours in distilled water, solvents of GA3, KCl and thiamine (300, 40 and 30 mg*L-1, respectively) and non-primed seed. Second factor was three cultivars of sorghum (Inqath, Kafier an

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (16)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Wed Mar 20 2024
Journal Name
Biomedical And Pharmacology Journal
Uropathogenic Infection Associated with Prostate Hypertrophy and Transurethral Resection of Prostate
...Show More Authors

Benign prostatic hyperplasia (BPH) is a prevalent condition among elderly and middle-aged men characterized by symptoms such as dysuria, urinary incontinence, and frequent micturition. The gold standard procedure for relieving BPH symptoms is transurethral resection of the prostate (TURP). However, some patients undergoing TURP are at risk of developing urinary tract infections (UTIs) due to uropathogenic bacteria. This prospective study aimed to investigate post TURP bacteruria alongside with multifactoria risk factors that implicated postoperatively compared to preoperative and intraoperative periods. Ninety patients undergoing TURP and 30 control subjects were included in the study. Urine specimen for urine analysis from pateints

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 26 2024
Journal Name
Surgical Neurology International
Orbital varices: Epidemiology, clinical presentation, and treatment outcomes – A scoping review
...Show More Authors
Background:

Orbital varices are vein dilations in the orbit presenting various symptoms. This scoping review synthesizes existing evidence on their epidemiology, clinical features, and treatment efficacy.

Methods:

Literature was reviewed according to Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. PubMed and Scopus were searched until April 31, 2024, for articles on clinically diagnosed ocular varices detailing diagnostic methods, treatments, and outcomes. Exclusions were reviews, animal studies, and incomplete case reports. Data on study characteristics, diagnosis, management, and o

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
نسق
Job security and its relationship to psychological tranquility in divorced teachers
...Show More Authors

A sense of job security for divorced female teachers is one of the basic and very important requirements for enjoying the mental health that a person needs in order to be positive, balanced and productive. job security is one of the important things that workers must feel not only to ensure interaction and harmony between them and officials, but to ensure their satisfaction and increasing their motivation towards work, as job security is one of the most important indicators of job satisfaction and optimism in life, and it leads to the experience of psychological reassurance, which affects the building of individuals' personalities, the development of their intellectual competence and the identification of their psychological characteristic

... Show More
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of the Boilers at Al-Mussaib Thermal Station
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Aug 26 2020
Journal Name
Journal Of Engineering
Groundwater Simulation and Wells Distribution at Qazaniyah City in Diyala Governorate
...Show More Authors

In recent years, there is more interest in water sources availability, including groundwater due to an increase in demand for water because of the increasing population in the world, and the water recedes due to climate change also. Therefore, the study of groundwater has required more attention. The aim of the present study is to establish a MODFLOW model in the groundwater modeling system software to simulate the movement of groundwater in the Turssaq alluvial fan which is located in the Qazaniyah city, east of Diyala Governorate. The solid model was used to define the aquifer in the study area. Using the GIS software, mapping and preparing the data needed to create a conceptual model were carried out. The data of the

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Comparison among variable selection models and its application to health dataset
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref