Preferred Language
Articles
/
ERZW9YcBVTCNdQwCy3JK
Synthesis of New Nucleoside Analogues From 3,5-Disubstituted Pyrazoline
...Show More Authors

n this work, a series of new nucleoside analogues (β-glucose liked to pyrazoline moiety) was synthesized. In the beginning, chalcone [1-3] was formed from the reaction of acetophenone and benzaldehyde derivatives in the presence of sodium hydroxide. Pyrazolines [4-6] were obtained from the reaction of the prepared chalcones and hydrazine hydrate in the presence of ethanol absolute. These pyrazolines were treated with β-glucose pentaacetate to afford a series of desirable protected nucleoside analogues [8-10]. After that hydrolysis of protected nuclioside analogues in sodium methoxide gave free nucleoside analogues [11-13]. These new formed compounds were diagnosed by 13C-NMR and 1H- NMR for some of them and FT-IR spectroscopy.

Scopus
Publication Date
Wed Jul 17 2019
Journal Name
Advances In Intelligent Systems And Computing
A New Arabic Dataset for Emotion Recognition
...Show More Authors

In this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Transform Fundamental Properties and Its Applications
...Show More Authors

        In this paper, new transform with fundamental properties are presented. The new transform has many interesting properties and applications which make it rival to other transforms.

Furthermore, we generalize all existing differentiation, integration, and convolution theorems in the existing literature. New results and new shifting theorems are introduced. Finally, comprehensive list of this transforms of functions will be providing.

View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The new aesthetic in contemporary world painting
...Show More Authors

The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cr (III), Fe (III), Co (II) and Cu(II)Metal ions complexes with azo compound derived from 2-hydroxy quinolin synthesis, characterization, thermal study and antioxidant activity
...Show More Authors

Azo-ligand-(HL)([4-((2-hydroxyquinolin-3-yl)diazenyl)-N-(5-methylisoxazol-3-yl)benzenesulfonamide] ) ,  (2- hydroxy quinolin  derivative),reacts with the next metal ions (Cr (III), Fe (III),Co (II) and Cu(II))  forming stable complexes with unique geometries such as(tetrahedral for bothCo (II) and  Cu (II), octahedral for both Cr (III) and Fe (III)). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, Fourier transfer proved the involvement of coordinated water molecule in all complexes besides the pyrolysis (TGA & DSC) studies proved the coordination of water residues with metal ions inside the coordination sphere as well as chlorine ato

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and antibacterial study of the ligand type Schiff base derived from amino acid [L- Phenylalanine] and its complexes with Co (II), Ni (II), Cu (II) and Zn (II) ions
...Show More Authors

  L-Phenylalanine amino acid was condensed with 2-hydroxybezaldehyde to give the Schiff base sodium 2-(2-hydroxybenzylideneamino)-3-phenylpropanoate, which was used as a precursor [NaHL]. The precursor was reacted with 1,2-dichloroethane to give the Schiff base sodium 2,2'-(2,2'-(ethane-1,2diylbis(oxy))bis(2,1-phenylene))bis(methan-1-yl-1-ylidene)bis(azan1-yl-1-ylidene)bis(3-phenyl propanoate), which was used as a ligand [Na2L], in complexation with some metal (II) chloride MCl2, where [M= Co(II), Ni(II), Cu(II) and Zn(II)], to give [M(L)] complexes. The [Na2L] ligand and All complexes were characterized by spectroscopic methods, [FTIR, UV-Vis, atomic absorption], melting point, chloride content, conductivity and magnetic susceptibi

... Show More
View Publication Preview PDF