Preferred Language
Articles
/
DxesoJIBVTCNdQwCa7vm
MTS-6 detectors calibration by using <sup>239</sup>Pu-Be neutron source
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 24 2020
Journal Name
Pramana
The neutron halo structure of 14B, 22N, 23O and 24F nuclei studied via the generalised Woods–Saxon potential
...Show More Authors

The radial wave functions of the generalise dWoods–Saxon (GWS) potential within the two-body model of (Core + n) have been used to study the ground-state density distributions of protons, neutrons and matter and the associated root mean square (rms) radii of neutron-rich 14B, 22N, 23O and 24F halo nuclei. The calculated results show that the radial wave functions of the generalised Woods–Saxon potential within the two-body model succeed in reproducing neutron halo in these exotic nuclei. Elastic electron scattering form factors for these nuclei are studied by combining the charge density distributions with the plane-wave Born approximation (PWBA).

View Publication
Publication Date
Sun Mar 01 2020
Journal Name
International Journal Of Modern Physics E
Investigation of halo structure of neutron rich 14B, 15C, 19C and 22N nuclei in the two body model
...Show More Authors

The two body model of (Core+n) within the radial wave functions of the cosh potential has been used to investigate the ground state features such as the proton, neutron and matter densities, the root mean square (RMS) nuclear proton, neutron, charge and mass radii of unstable neutron-rich 14B, 15C, 19C and 22N nuclei. The calculated results show that the two body model with the radial wave functions of the cosh potential succeeds in reproducing neutron halo in these nuclei.

View Publication
Scopus (14)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jan 02 2025
Journal Name
Journal Of Advanced Pharmacy Education And Research
Review of interleukin-6 polymorphisms in rheumatoid arthritis: a genetic implications
...Show More Authors

The objective review is to inspect the involvement of Interleukin-6 (IL-6) in rheumatoid arthritis (RA) and to highlight the role of IL-6 and its variants in the pathogenesis of RA and response to anti-IL-6 agents. Several genetic and environmental risk factors and infectious agents contributed to the development of RA. Interleukin-6 is engaged in self-targeted immunity by modifying the equilibrium between T regulatory (T-reg) and T helper-17 (Th-17) cells. The evidences reported that IL-6 parti

View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Biochem. Cell. Arch.
6-Mercaptopurine Derivatives: Maintenance Therapy Of Acute Lymphoblastic Leukemia: A Review
...Show More Authors

Scopus (4)
Scopus
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Cephalothin as a Carrier of 6-Mercaptopurine for Targeting Cancer Tissues
...Show More Authors

A lower extracellular pH is one of the few well-documented physiological differences between tumour and normal tissues. On the other hand, elevated glutathione (GSH) level has been detected in many tumours compared with healthy surrounding tissues. The compound II: 3-(9H-purin-6-yl-thio) carbonothionyl methyl-8-oxo-7-(2-thiophen-2-yl) acetamido-5-thia-1-azabicyclo-4-octo-ene-carboxylic acid was a cephalothin derivative contain 6-mercaptopurine (6-MP). Compound II react with general base catalysis in slightly acidic pH or with sulfhydryl nucleophiles to release the chemotherapeutic drug 6-MP. The generation of compound II was accomplished following multistep reaction procedures. The structure of compound II and its intermediate was confir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Synthesis and Characterization of N-((6-substituted - Benzothiazol-2-Y)succunamic acid.3-(6-substituted-benzothiazol-2-Y1)-Carbamoyl Prorionyl Chloride and study of thier Biological effects
...Show More Authors

Twelve N-(6-sustirured benzothanol-2-y1) succinamic acids and 3-(6-substitted benzonathol-2-y1)-carbamoyl propionyl chloride were synthesized in good yields from reaction of benzonathol2-yl)

View Publication Preview PDF
Publication Date
Thu Oct 12 2017
Journal Name
Iraqi Journal Of Laser
A Comparative Evaluation of Post-Operative Pain and Function after Gingival Depigmentation Using 940 Nm Diode Laser And Conventional Bur Method: 6 Months Study
...Show More Authors

The aim of the study was to evaluate the efficacy of diode laser (λ=940 nm) in the management of gingival hyperpigmentation compared to the conventional bur method. Materials and methods: Eighteen patients with gingival hyperpigmentation were selected for the study with an age between 12-37 years old. The site of treatment was the upper gingiva using diode laser for the right half and the conventional method for the left half. All patients were re-evaluated after the following intervals: 3 days, 7 days, 1 month and 6 months post-operation. Pain and functions were re-evaluated in each visit for a period of 1 day, 3 days and 1 week post-operation. Laser parameters included 1.5 W in continuous mode with an initiated tip (400 μm) placed in

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 08 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref