Preferred Language
Articles
/
AEKWuJsBMeyNPGM3N-A2
Anew Spectrophotometric Method For The Determination of La (III) With 3-Hydroxy -4-(2-hydroxy –Phenyl azo)Naphthalene -1-Sulfonic Acid
...Show More Authors

A simple, rapid and sensitive spectrophotometric method has been proposed for the determination of La (III) using 3-hydroxy -4-(2-hydroxy-phenyl azo) naphthalene -1- sulfonic acid as a chromogenic reagent. This method is based on the formation of a red-pink colored complex, upon the reaction of La(III) with the reagent in an alkaline medium (pH= 9.50), having a maximum absorbance at 459 nm. Beer's law is valid in the concentration range 0.512 µg.ml-1 with a Sandell's sensitivity value of 0.0188 µg.cm-2 and molar absorptivity of 7376.12 L.mol-1.cm-1. The stoichiometric composition of the chelate is 1:3. The effect of the presence of different cations as interferants in the determination of La(III) under the given optimum conditions were investigated.

Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
SARS-CoV-2 and other Coronaviruses: A matter of variations
...Show More Authors

Since the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Absorption and Fluorescence Properties of 3,6-bis(5-bromothiophen-2-yl)-2,5-bis(2-ethylhexyl)-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione. A Covalent Fluorescence in Solution and in the Solid State
...Show More Authors

In the cuurent article, the photophysical properties of 3,6-bis(5-bromothiophen-2-yl)-2,5-bis(2-ethylhexyl)-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione were investigated. The visible absorption bands at 527, 558 and 362 nm in propylene carbonate and the compound was found to be fluorescent in solution and in the plastic film with emission wavelengths between 550- 750 nm. The Stokes Shift of P.C., acetonitrile, diethyl ether, Tetrahydrofuran THF, cyclohexane, dibutyl ether, and dichloromethane DCM  are 734, 836, 668, 601, 601, 719, and 804 cm-1 in respectively. The Stokes Shift Δ was less in THF and cyclohexane, than the solvents, which indicates that the energy loss is less between the excitation and fluorescence states. The

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Estimating of Fatty Acids, Tcopherols, Tocotrienols, Total Carotens, Study The Physiochemical Properties And Unsaponifiable Matters Extraction From Crude Red Palm Oil(1)
...Show More Authors

The percentage of fatty acids, quantity of tocopherols, tocotrienols, carotens and physiochemical characteristics of crude red palm oil have been evaluated, in addition to specific chemical detection of active compounds unsaponifiable matters. Results of Gas Liquid Chromatography showed:- The major fatty acids in red palm oil is palmitic (44.36%) then oleic (39.65%), linolenic (10.55%), stearic (3.56%), myristic (1.22%), arachdonic (0.24%) and palmotic (0.19%). Red palm oil contains ? – ?- ?- ? – Tocopherols with concentration 258 , 121 , 259, 109 m/kg oil , ? – ?- ?- ? – Tocotrienol with concentration 462.77 , 571.03, 619.18, 509.07 m/kg oil respectively. Total tocopherols & tocotrienols 2909.05 m/kg oil and

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Methionine as a Spacer between Poly Acrylic acid and Ampicillin
...Show More Authors

In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with compar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Antibacterial Inhibitor as an Expired Metoclopramide in 0.5M Phosphoric Acid
...Show More Authors

Expired drug Metoclopramide was investigated as an antibacterial corrosion inhibitor for carbon steel in 0.5M H3PO4 solution using the electrochemical method at 30oC and 60oC. The results showed that this drug is an efficient inhibitor for carbon steel and the efficiency reached to 82.244 % for 175 ppm at 30oC and 76.146% for 225 ppm at 60oC. The adsorption of drug on carbon steel surface follows Langmuir adsorption isotherm with small values of adsorption-desorption constant. The polarization plots revealed that Metoclopramide acts as mixed-type inhibitor. Some parameters of inhibition process were calculated and discussed. The surface morphology of the carbon steel speci

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
EL ANÁLISIS DE ERRORES DEL LEÍSMO Y LAÍSMO EN EL PAPEL DIDÁCTICO PARA LOS ALUMNOS DEL DEPARTAMENTO ESPAÑOLEN LA FACULTAD DE LENGUAS EN IRAK Search Summary: The analysis of the mistakes of the personal pronouns in effect replaces him in the
...Show More Authors

During the educational practices in the Spanish department at the Faculty of Languages ​​, University of Baghdad , we noticed that the personal pronouns in effect replaced by the direct and indirect characterized hardly be expressed , and the difficulty of her education.

Rationale: I chose this topic because the personal pronouns differ between the Spanish language and the Arabic language. We believe that this study may be useful not only for language teachers, but also for students, because it can contribute to a greater awareness of and correct weaknesses.

Objectives: To apply the model from which to address the problems in the use of personal pronouns Spanish , and the difference between effect of direct and indire

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More