Preferred Language
Articles
/
MRabXocBVTCNdQwCk0j-
Synthesis and Characterization of Some New Substituted 5-Bromo Isatin and Their Antimicrobial Activity
...Show More Authors

New 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with  P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give  3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride  in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained  the intermediate compound(2).Compound(2) was  reacted with different reagents  in four routes.The first route involved direct reaction with substituted  2-aminobenzothiazole under certain condition to give new compounds (3-8).The  second route involved condensation compound(2) with 5-substiuted -2-amino 1,3,4-oxodiazole  in the presence  of anhydrous potassium carbonate to give new compounds(9-13),while the third route involved condensation compound (2) with para-chloro sulphonyl aniline to give a compound (14) which was treated to give  new sulphonylamide compounds (15-19) with different primary aromatic amines in the fourth route compound (2)  was treated with hydrazine hydrate in dimethylformaid(DMF) to give compound (20) ,the hydrazide derivatives(20)was reacted with different acid anhydrides in acetic acid as a solvent to give compounds (21-25). The  Structure of newly synthesized compounds were identified by spectral methods [FTIR,1H-NMR]and measurements some of it’s  physical properties and some specific  reaction. Furthermore were studied the effects of the preparing compounds on some strains of bacteria and one yeast.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Water Treatment With Conventional and Alternative Coagulants: A Review
...Show More Authors

There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Biochemical Cellular Archive
The relationship between helicobacter pylori infection and reproductive disorder
...Show More Authors

To determine the relationship between infertility and Helicobacter pylori infection, thirty-five infertile patients of ages (20-49) years have been investigated and compared with 10 apparently firtility individuals. All the studied groups were carried out to measure (ASA), (TNF-á), (IL-6), (anti-H.pylori IgA) and (anti-H.pyloriIgG) by Enzyme linked immunosorbent assay (ELISA) technique. The statistical analysis also demonstrated that there were a highly significant differences (P<0.01), when compared between studied group. Also, the statistical analysis demonstrated that there were a highly significant differences (P<0.01) when compare between infertility and fertility in Conc. of sperm. The percentage distribution of ASA in serum and seme

... Show More
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Vibration Characteristics Oblate Shell "With and Without Framed Structure"
...Show More Authors

This paper presents the results of investigating the vibrational characteristics of oblate dish with and without framed structure . A finite element method, was applied to the dynamic analysis of oblate spheroidal shell. Different types of elements were considered in one dimension and two dimensions. It was found that the natural frequencies of oblate shells had two types of behavior against increasing the shell thickness and eccentricity, which are the membrane mode and bending mode –Since – the membrane modes natural frequencies tend to increase with the increasing the eccentricity of oblate, while the bending modes natural frequencies decrease with the increasing the eccentricity till reach the optimum eccentricity.

 

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Mathematical Statistician And Engineering Applications
Artin Indicatorfor the Groups SL(2,53 ) and SL(2,55 )
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Medical Toxicology &amp; Legal Medicine
The relationship between body mass index and asthma control
...Show More Authors

Asthma and obesity are both a major public health problems affecting large numbers of individuals across the globe. Link between obesity and asthma is now considered as a recognized fact, and many epidemiological studies, found that overweight and obese people had a higher chance of developing asthma, with more severe symptoms. Assessment of the relationship between body mass index and asthma control. A cross-sectional study, that included 100 patients diagnosed with asthma, attending the respiratory disease consultatory unit at Baghdad teaching hospital. Body mass index was calculated by (BMI= weight in Kg/Height in m2), and Asthma control was assessed using asthma control test questionnaire forma. Statistical analysis done using, Test of

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Audio compression using transforms and high order entropy encoding
...Show More Authors

<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low &amp; multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref