Preferred Language
Articles
/
MRabXocBVTCNdQwCk0j-
Synthesis and Characterization of Some New Substituted 5-Bromo Isatin and Their Antimicrobial Activity
...Show More Authors

New 2-amino thiazole ,oxodiazole, sulphonilamide and diazin derivatives of N-(α-chloro aceto)-3-(tolyl imino)-5-bromo-2-oxo-indole(2) have been synthesized .The preparation process started by the reaction of 5-bromo isatin with  P-toluidine in the presence of glacial acetic acid and dimethylformamide(DMF) as a solvent to give  3-(tolyl imino)5-bromo-1H-indole-2-one.(1), Compound (1) with sodium hydride  in dimethylformamide(DMF) at 0C0 gave a suspension of the sodium salt of Schiff base derivative and subsequent reaction with monochloroacetylchloride obtained  the intermediate compound(2).Compound(2) was  reacted with different reagents  in four routes.The first route involved direct reaction with substituted  2-aminobenzothiazole under certain condition to give new compounds (3-8).The  second route involved condensation compound(2) with 5-substiuted -2-amino 1,3,4-oxodiazole  in the presence  of anhydrous potassium carbonate to give new compounds(9-13),while the third route involved condensation compound (2) with para-chloro sulphonyl aniline to give a compound (14) which was treated to give  new sulphonylamide compounds (15-19) with different primary aromatic amines in the fourth route compound (2)  was treated with hydrazine hydrate in dimethylformaid(DMF) to give compound (20) ,the hydrazide derivatives(20)was reacted with different acid anhydrides in acetic acid as a solvent to give compounds (21-25). The  Structure of newly synthesized compounds were identified by spectral methods [FTIR,1H-NMR]and measurements some of it’s  physical properties and some specific  reaction. Furthermore were studied the effects of the preparing compounds on some strains of bacteria and one yeast.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Prepared (PbS) Thin Film Doped with (Cu) and Study Structure Properties
...Show More Authors

In this research PbS and PbS:Cu films were prepered with thicknesses (0.85±0.05)?m and (0.55±0.5)?m deposit on glass and silicon substrate respectively using chemical spray pyrolysis technique with a substrate temperature 573K, from lead nitrate salt, thiourea and copper chloride. Using XRD we study the structure properties for the undoped and doped films with copper .The analysis reveals that the structure of films were cubic polycrystalline FCC with a preferred orientation along (200) plane for the undoped films and 1% doping with copper but the orientation of (111) plane is preferred with 5% doping with the rest new peaks of films and appeared because of doping. Surface topography using optical microscope were be checked, it was found

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Eyes Drugs and Treatment at Ibn al –Haytham: A Historical Study
...Show More Authors

            Ibn al-Haytham is the pioneer of optics, which is a science that had described optics circumstances. Optics or landscape science as it was known by the Arab and Muslim scientists at the time when  is a science known as the conditions of sighters in their quantity and quality as the proximity and distance from the beholder , the different forms , conditions and what mediate between the beholder and the microscopes , to explain useful knowledge of what obscures the sight of the conditions of sighters and is used to measure the space Distant criminality and  mirrors.

Ibn al-Haitham wrote his famous book The Book of Mirrors and studied mistakes adopted the m

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Patients' Knowledge and adherence to Clopidogrel Therapy post Percutaneous Coronary Intervention
...Show More Authors

Abstract

Objectives: To assess patients’ knowledge and their adherence to Clopidogrel Therapy Post Percutaneous Coronary Intervention, and to find out the relationship between patients’ knowledge and their adherence to Clopidogrel Therapy Post Percutaneous Coronary Intervention

Methodology: A descriptive design was carried out at Al- Nasiriyah Heart Center in Thi-Qar Governorate for the period between May 19th, 2022 to October 25th, 2022. A non-probability sampling was used among (50) patients after their Percutaneous Coronary Intervention. The study instrument that used to collect data was composed of three parts namely: sociodemographic charac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Terrorism and Internal Displacement in Iraq: A Field Study in Baghdad
...Show More Authors

    Terrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.

    In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Bacteriological and Cytological study For bronchial washes from lung cancer patients
...Show More Authors

The study included the collection of 75 bronchial wash samples from patients suspected to have lung cancer. These samples were subjected to a diagnostic cytological study to detect the dominant type of lung cancer. It was noticed that 33 patients proved to have a lung cancer out of 75 (44%) of these, 19 cases (57.6%)were diagnosed having Squamus cell carcinoma,7cases (21.21%) showed Adenocarcinoma ,6 cases (18.18%) were having small cell carcinoma while only one case (3.03%)was large cell carcinoma .Nearly 70% of cases were correlated with smokers .Bacteria were isolated from 53 patients in which 33 isolates were associated with the cancer cases while 20 of them from non infected patients. By using different morphological ,biochemical test

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Wed Dec 04 2024
Journal Name
F1000research
Correlation between plasma homocysteine and ischemic heart disease in young Adults
...Show More Authors

Background Cardiovascular disease (CVD) is a leading cause of death worldwide. Ischemic heart disease is a major cause of morbidity and mortality. Lack of blood supply to the brain can cause tissue death if any of the cerebral veins, carotid arteries, or vertebral arteries are blocked. An ischemic stroke describes this type of event. One of the byproducts of methionine metabolism, the demethylation of methionine, is homocysteine, an amino acid that contains sulfur. During myocardial ischemia, the plasma level of homocysteine (Hcy) increases and plays a role in many methylation processes. Hyperhomocysteinemia has only recently been recognized as a major contributor to the increased risk of cardiovascular disease (CVD) owing to its eff

... Show More
View Publication
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Red Monkey Optimization and Genetic Algorithm to Solving Berth Allocation Problems
...Show More Authors

In the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other

... Show More
View Publication Preview PDF
Crossref (1)
Crossref