Preferred Language
Articles
/
4hZjjooBVTCNdQwCYJ5a
Synthesis, Spectroscopic, Characterization and Biological Activities of Schiff Base Ligand and Metal Complexes of Some Metal (II) Salts with Anthranilic Acid
...Show More Authors

Schiff base N,N'-Bis-(4-dimethylamino-benzylidene)-benzene-1,4-diamine has been synthesized from 4-dimethylaminobenzenaldehyde and benzene-1,4-diamine. The structure of Schiff base was obtained by (C.H.N.) microanalysis, Mass, 1HNMR, FT-IR and UV-Vis spectral methods and thermal analysis. Metal mixed ligand complexes of some metal(II) salts with Schiff base ligand and anthranilic acid were prepared in the molar ratio (1:2:2), (Metal):(SBL)2:(Anthra)2, (SBL)= Schiff base ligand, (Anthra) =anthranilic acid and Metal= Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II). The thermal behaviour (TGA) of the complexes was studied. The prepared complexes identified by using mass, thermal analysis, FT.IR and UV-Vis spectrum methods, on otherwise flame atomic absorption, magnetic properties and conductivity measurements. According, the characterization of the complexes from the mixture of anthranilic acid and the ligand prepared according to Schiff base ligand exhibited that the anthranilic acid make the coordination with metals (II) without existence of the Schiff base ligand. The coordination became Metal:(Anthra)2, from The physico-chemical data suggested octahedral geometry for the all complexes. The Schiff base ligand, anthranilic acid and metal(II)- complexes were screened for antibacterial activity against Staphlococcus epidermidies and Staphylococcus aureus (Gram Positive Bacteria) as well as Klebsiella and Escherichia coli (Gram Nagetive Bacteria) by the agar well diffusion method.

Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 09 2020
Journal Name
Agrosystems, Geosciences & Environment
In-season potato yield prediction with active optical sensors
...Show More Authors

Crop yield prediction is a critical measurement, especially in the time when parts of the world are suffering from farming issues. Yield forecasting gives an alert regarding economic trading, food production monitoring, and global food security. This research was conducted to investigate whether active optical sensors could be utilized for potato (Solanum tuberosum L.) yield prediction at the mid.le of the growing season. Three potato cultivars (Russet Burbank, Superior, and Shepody) were planted and six rates of N (0, 56, 112, 168, 224, and 280 kg ha−1), ammonium sulfate, which was replaced by ammonium nitrate in the 2nd year, were applied on 11 sites in a randomized complete block design, with four replications. Normalized difference ve

... Show More
View Publication
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Al-kindy College Medical Journal
Prevention in Healthcare Practice: An issue with Rising Importance
...Show More Authors

Plentiful of healthcare practice is based on a disease/treatment approach rather than a prevention one.  That is, the predominant focus is on treating existing symptoms and conditions that bring the patient to healthcare setting. There is no doubt about the significance of this approach for acute conditions, but there is some question whether this is the most efficient and effective way of distributing healthcare for increasing number of diseases and limited resources.

The evidences from everywhere have showed the profound cost benefit of prevention in healthcare practice. Healthy community, therefore, is the ultimate aim in any health services planning. The priority of care giver is shifted now to promote health and prevent

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Iraqi Postgraduate Medical Journal
Angiolymphoid hyperplasia with eosinophilia (pseudopyogenic granuloma) among Iraqi patients
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1

View Publication
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
VCAM-1 Expression in Endometerium with Human Cytomegalovirus Infection
...Show More Authors

Background: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Chaos synchronization delay in semiconductor lasers with optoelectronic feedback
...Show More Authors

In this work we reported the synchronization delay in
semiconductor laser (SL) networks. The unidirectional
configurations between successive oscillators and the correlation
between them are achieved. The coupling strength is a control
parameter so when we increase coupling strength the dynamic of the
system has been change. In addition the time required to synchronize
network components (delay of synchronization) has been studied as
well. The synchronization delay has been increased by mean of
increasing the number of oscillators. Finally, explanation of the time
required to synchronize oscillators in the network at different
coupling strengths.

View Publication Preview PDF
Crossref