Preferred Language
Articles
/
JhaQI4cBVTCNdQwCIjpL
Novel Metal Complexes of Tetradentate Ligands Type N2S2 Synthesis and Physico-Chemical Characterisation
...Show More Authors

This study is included the preparation of two tetradentate amide-thiol proligands of the general structure [H2Ln], [where; (n = (1–2)]. The ligands [H2L1] and [H2L2] have been prepared from the reaction of the cyclic thioester 2-oxo-1, 4-dithiacyclohexane (compound 1) and 3-chloro-2-oxo-1, 4 dithiacyclohexane (compound 2) with 2-aminomethanepyridine in (1:1) ratio respetively. The reaction was carried out in chloroform at room temperature and under N2 atmosphere. Structural formula of these two ligands have been reported.

Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Aquatic Sience
Helminths and their fish hosts as bioindicators of heavy metal pollution: A review
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Some Non-destructive Testing for Al metal in 0.1N of NaCl and NaOH
...Show More Authors

In this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of disinfectant agents on certain physical and mechanical properties of type IV dental stone
...Show More Authors

Background: Dental stone casts come into contact with impression materials and becomes susceptible to cross contamination from saliva and blood. This study was done to evaluate the physical and mechanical properties of dental stone type IV after treatments with various disinfecting agents and regimes (methods). Materials and Methods: Type IV dental stone and different types of disinfecting agents were used and divided into seven groups: G1: dental stone without disinfection (control group), G2: dental stone mixed with silver nitrate powder 0.5% , G3: dental stone mixed with silver nitrate powder 1%, G4: dental stone mixed with copper sulfate powder 0.5%, G5: dental stone mixed with copper sulfate powder 1% ,G6: dental stone immersed in prop

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
The effect of current density on the structures and photoluminescence of n-type porous silicon
...Show More Authors

Porous silicon (PS) layers were formed on n-type silicon (Si) wafers using Photo- electrochemical Etching technique (PEC) was used to produce porous silicon for n-type with orientation of (111). The effects of current density were investigated at: (10, 20, 30, 40, and50) mA/cm2 with etching time: 10min. X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon. The maximum crystal size of Porous Silicon is (33.9nm) and minimum is (2.6nm) The Atomic force microscopy (AFM) analysis and Field Emission Scanning Electron Microscope (FESEM) were used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Turkish Journal Of Agriculture - Food Science And Technology
Determination of Operating Characteristics of 540 and 540E PTO Applications in Disc Type Silage Machines
...Show More Authors

In this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
‏ Plant Archives 21 (1), 1458-1462‏
EFFECT OF ROOTSTOCK TYPE, ORGANIC FERTILIZER AND IRRIGATION INTERVALS ON GROWTH OF" MAHALI" LEMON TRANSPLANTS‏
...Show More Authors

Publication Date
Sun Apr 14 2024
Journal Name
Plant Archives (09725210)
Effect of addition of organic and chemical fertilization and spraying of alpha tocopherol on the growth and yield of tomato (Solanum lycopersicum mill.).
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 26 2023
Journal Name
International Journal Of Environment And Waste Management
Novel Poly (3-hydroxybutyrate) production using Bacillus subtilis NG220 and watermelon derived substrates
...Show More Authors

Poly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi

... Show More
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref