Preferred Language
Articles
/
NheZjpABVTCNdQwCw41o
Synthesis, Characterization, and Biological Activity of Mixed ligand Complexes from 8-Hydroxyquinoline and new Ligand for β-Enaminone
...Show More Authors

The synthesized ligand [4-chloro-5-(N-(5,5-dimethyl-3-oxocyclohex-1-en-1-yl)sulfamoyl)-2-((furan-2-ylmethyl)amino)benzoic acid] (H2L1) was identified utilizing Fourier transform infrared spectroscopy (FT-IR), 1 H, 13 C – NMR, (C.H.N), Mass spectra, UVVis methods based on spectroscopy. To detect mixed ligand complexes, analytical and spectroscopic approaches such as micro-analysis, conductance, UV-Visible, magnetic susceptibility, and FT-IR spectra were utilized. Its mixed ligand complexes [M(L1)(Q)Cl2] [ where M= Co(II), Ni(II) , and Cd(II)] and complexes [Pd(L1)(Q)] and [Pt(L1)(Q)Cl2]; [H2L1] =β-enaminone ligand =L1 and Q= 8-Hydroxyquinoline = L2]. The results showed that the complexes were synthesised utilizing the molar ratio M: L1:L2 (1 :1 :1). The formation of six-coordinate octahedral geometry was proposed for metal complexes Co (II), Ni (II), Cd (II), and Pt (IIII), while the Pd (II) complex was square planar. By using the agar well diffusion method, the ligands and complexes were evaluated for antibacterial activity against Staphylococcus aureus, Escherichia coli. The studies demonstrate that the ligand and its complexes have variable activity against the bacterial types, Some of the complexes had an effect on bacteria, while others had less inhibitory action than the ligand. Also, the produced ligand and its metal complexes have been tested for fungi (Candida albicans );the complexes exhibited suppressing activity against fungi compared to the ligand prepared from them

Scopus
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Production of Bioethanol from Waste Potatoes
...Show More Authors

In this research, production of ethanol from waste potatoes fermentation was studied using Saccharmyses cerevisiae. Potato Flour was prepared from potato tubers after cooking and drying at 85°C. Homogenous slurry of potato flour was prepared in water at solid liquid ratio 1:10. Liquefaction of potato flour slurry with α-amylase at 80°C for 40 min followed by saccharification with glucoamylase at 65°C for 2 hr .Fermentation of hydrolysate with Saccharomyces cerevisiae at 35°C for two days resulted in production of 33 g/l ethanol.

      The parameters studied were; temperature, time of fermentation and pH. It was found that Saccharification process is affected by enzyme Amylo 300 conc

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 1997
Journal Name
Polymer-plastics Technology And Engineering
Reverse Calculation of Pressure from Pseudopressure
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Apr 04 2014
Journal Name
International Journal Of Sciences: Basic And Applied Research
Production of bioethanol from reed (Phragmitesaustralis)
...Show More Authors

Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Extraction of Chlorophyll from Alfalfa Plant
...Show More Authors

The extraction process of chlorophyll from dehydrated and pulverized alfalfa plant were studied by percolation method. Two  solvent systems were used for the extraction namely; Ethanol-water and Hexane-Toluene systems . The effect of circulation rate, solvent concentration, and solvent volume to solid weight ratio were studied. In  both ethanol water, and Hexane-Toluene systems it appears that solvent concentration is the most effective variable.

 

 

View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
International Society For The Study Of Vernacular Settlements
Evaluation of Sustainability Using LEED Rating Scales: The Bismayah New City in Baghdad, Iraq
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref