Preferred Language
Articles
/
MRabXocBVTCNdQwCk0j-
Synthesis and Characterization of Some New Substituted 5-Bromo Isatin and Their Antimicrobial Activity
...Show More Authors

New 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with  P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give  3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride  in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained  the intermediate compound(2).Compound(2) was  reacted with different reagents  in four routes.The first route involved direct reaction with substituted  2-aminobenzothiazole under certain condition to give new compounds (3-8).The  second route involved condensation compound(2) with 5-substiuted -2-amino 1,3,4-oxodiazole  in the presence  of anhydrous potassium carbonate to give new compounds(9-13),while the third route involved condensation compound (2) with para-chloro sulphonyl aniline to give a compound (14) which was treated to give  new sulphonylamide compounds (15-19) with different primary aromatic amines in the fourth route compound (2)  was treated with hydrazine hydrate in dimethylformaid(DMF) to give compound (20) ,the hydrazide derivatives(20)was reacted with different acid anhydrides in acetic acid as a solvent to give compounds (21-25). The  Structure of newly synthesized compounds were identified by spectral methods [FTIR,1H-NMR]and measurements some of it’s  physical properties and some specific  reaction. Furthermore were studied the effects of the preparing compounds on some strains of bacteria and one yeast.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Family violence: Causes and its effects - Analytical social study
...Show More Authors

The aim of this study is to investigate the main causes of the family violence and its
social effects.
The study reveals that main factors causes of the violence are interaction between
multi-factors.
The study shows that the poverty, low educational level, house crowded, large family
size, all of these variables causes of the violence, and then causes of family disorganization
and juvenile delinquency.
The study contain of three sections:
First: Focused on the causes of the violence.
Second: The interaction between multi factors.
Third: Social effects of family violence.

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Gogny interaction and nuclear charge distribution in 48Ca Nucleus
...Show More Authors

Charge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to  interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Fracture Toughness and Hardness studying for Polymer-Ceramic Composite
...Show More Authors

A particulate composite material was prepared by adding the Titanium dioxide (TiO2) with a particle size of (75-150) µm to Epoxy resin at weight percentage of (10%,20%,30%,40%,50%).The following some mechanical properties were studied,fracture toughness, hardness.casting preparation methods were used in this study includes preparing plate of matrix and composites. specimens were prepared according to ASTM for the Mechanical properties tests. After that Another samples were heat treated for three and six hour at 65C?. Fracture toughness (Kic) represent for stress intensity factor results were showed that the curve of three hours aging increases in fracture toughness (Kic) for composites but for six hours aging increases fracture tough

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 15 2025
Journal Name
Political Issues
(The Libyan crisis in the Turkish and Iranian perspectives)
...Show More Authors

The Turkish intervention in the Libyan crisis in the recent period was a trigger for more tension than a solution - as Turkey claims - as Turkey seeks to quickly set a welcome military footing in Libya to prevent the reconciliation government from falling and planning to start exploration for gas and oil in Libya to solve the Turkish energy crisis, that is, the energy exchange for security and trying to exploit the situation to establish a new gathering of proTurkish political Islam, as for the Iranian position on the Libyan crisis, it does not exceed a logistical role and provide Turkey with expertise in circumventing international sanctions and assisting it in transporting fighters and weapons to Libya, Iran has also deliberately added so

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Hematology
Microalbuminuria among children and adolescents with sickle cell disease
...Show More Authors

BACKGROUND: Sickle cell nephropathy, a heterogeneous group of renal abnormalities resulting from complex interactions of sickle cell disease (SCD)-related factors and non-SCD phenotype characteristics, is associated with an increased risk for morbidity and mortality. AIMS: The aims of this study were to determine the frequency of microalbuminuria (MA) among pediatric patients with SCD and to determine risk factors for MA among those patients. SUBJECTS AND METHODS: A case–control study was carried out on 120 patients with SCD, 2–18 years old, registered at Basrah Center for Hereditary Blood Diseases, and 132 age-and sex-matched healthy children were included as a control group. Investigations included complete blood panel, blood urea, se

... Show More
Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Image Watermarking based on Huffman Coding and Laplace Sharpening
...Show More Authors

In this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Environmental tax and its role in sustainable social development
...Show More Authors

Abstract:

  The research aims to diagnose the relationship between the environmental tax and the development of the sustainable social dimension, where the environmental tax is considered a tool in promoting sustainable development according to its economic, social and environmental dimensions through the application of legislation and instructions for environmental protection, and that imposing an environmental tax will have a clear impact in achieving the dimensions of sustainable development and compliance With regard to the social dimension, the research relied on the financial data for the years (2019-2022) in obtaining information. The research reached a set of results, the most prominent of which was

... Show More
View Publication Preview PDF