Preferred Language
Articles
/
EBZ7oooBVTCNdQwC5qJW
Tubular Magnetic Shielding Scan (TMSS): A New Technique for Molecular Space Exploration. (i) The Case of Aromaticity of Benzene and [<i>n</i>]Paracyclophanes
...Show More Authors

Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs allow for the recording of magnetic shielding from the bent ring levels of [n]pCPs, while CGs provide tubular magnetic shielding scan (TMSS) maps detailing the magnetic shielding from a cylindrical region above and below the ring frame. Our findings suggest that smaller [n]pCPs with n < 6 exhibit deviations in the magnetic shielding above and below the ring, indicating a broken electron delocalization under the ring. In contrast, larger [n]pCPs tend to behave similarly to benzene in terms of magnetic shielding. Moreover, we found that shorter polymethylene chains of [n]pCPs exhibit significantly higher magnetic shielding interactions with the ring. Both of the above techniques offer new and promising tools for characterizing nonplanar aromatic compounds, thereby contributing to a deeper understanding of their magnetic and electronic properties.

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Nov 07 2020
Journal Name
Theory And Practice Of Mathematics And Computer Science
Discussion on Bipolar Fuzzy n-fold KU-ideal of KU-algebras
...Show More Authors

Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Characterization of n-CdO:Mg /p-Si Heterojunction Dependence on Annealing Temperature
...Show More Authors

In this research, thin films of CdO: Mg and n-CdO: Mg/ p-Si heterojunction with thickness (500±50) nm have been deposited at R.T (300 K) by thermal evaporation technique. These samples have been annealed at different annealing temperatures (373 and 473) K for one hour. Structural, optical and electrical properties of {CdO: Mg (1%)} films deposited on glass substrate as a function of annealing temperature are studied in detail. The C-V measurement of n-CdO: Mg/ p-Si heterojunction (HJ) at frequency (100 KHz) at different annealing temperatures have shown that these HJ were of abrupt type and the builtin potential (Vbi) increase as the annealing temperature increases. The I-V characteristics of heterojunction prepared under dark case at

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Gene Reports
Genotyping of Human Cytomegalovirus Glycoprotein N in Iraqi Breast cancer Patients
...Show More Authors

Human Cytomegalovirus (HCMV) is an enveloped ubiquitous ds-DNA virus that has been implicated in several types of malignancies. The current work was conducted in the period extending from (November 2018 to the end of October 2019) and aimed to assess the frequency of glycoprotein N (gN) genotypes of HCMV. A total number of 91serum and plasma specimens were collected to fulfill this purpose from females (71 breast cancer patients, and a control group of 20 females) attending Al-Amal hospital for cancer management and Baghdad teaching hospital. The molecular part of this data was achieved through both PCR and Multiplex PCR for detection of HCMV gN (UL73) entire gene as well as for genotyping. gN was detected in 36/71 (50.7%) of breast cancer

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2010
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SEDIMENTO LOGICAL STUDY OF SHIRANISH FORMATION WELL DD-1 (N-IRAQ)
...Show More Authors

Shiranish formation has been divided into two microfacies units: 1-Marly biowacke stone facies 2-Biogenic pack stone facies These microfacies reflected marine deep shelf margin in the upper part of the formation, the lower part was deeper. 238 slides were investigated depending on Mineralogical, compositional and Biological processes, which reflect deep shelf margin at upper part of the formation, but at the lower part open sea environment. The age of the formation is estimated depending on the recognized biostratigraphic zone using the index fossils to be Upper- Middle Maestrichtian.

View Publication Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A New Hybrid Meta-Heuristics Algorithms to Solve APP Problems
...Show More Authors
Abstract<p>In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.</p>
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF