Preferred Language
Articles
/
NxYIz4sBVTCNdQwC2uCF
Adsorption Study of Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1,2-diylidenebis(methan-1-yl-1-ylidene) bis (2-methoxyphenol)] on Granulated Initiated Calcined Iraqi Montmorillonite via Columnar Method.
...Show More Authors

The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monolayer adsorption capacity is 5.7347 mg ligand (L) per 1g calcined Montmorillonite. The experiments showed that highest removal rate 75.70 % for ligand (L) at pH 7.The kinetic data for the adsorption process obeyed pseudo-second-order rate equations.

Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A study of Hepcidin levels and other Biochemical parameters in woman with Osteoporosis with Type 2 Diabetes Mellitus
...Show More Authors

Background: Diabetes mellitus (DM) could be regarded as a set of chronic metabolic disorders which have a common aspect of hyperglycemia. The resistance in the peripheral actions of insulin or impaired insulin secretion could be the reason  hepcidin which is a peptide hormone derived from liver, in systemic iron homeostasis is an essential regulator, and its lopsided production participates in the pathogenesis of iron disorders in spectrum. Osteoporosis often accompanies many diseases like ß-thalassemia, hemochromatosis, sickle liver diseases, cell disease and hemosiderosis featured by iron overload, evidences suggest that Iron overload and iron deficiency are suggested by evidences that they affect bone in a negative way, acting

... Show More
View Publication
Publication Date
Thu Oct 26 2023
Journal Name
Malaysian Journal Of Science
HEMICAL ELUCIDATION AND BIOLOGICAL SCREENING STUDY OF NEW LIGAND DERIVED FROM 5, 6-O-ISO PROPYLIDENE-L-ASCORBIC ACID AND ITS METAL (II) COMPLEXES
...Show More Authors

الوصف A simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5, 6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro (carboxylic) methylidene]-5, 6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl (6-methyl-2-pyridylmethyl) amine to create a new ligand (ONMILA). This novel ligand was identified using

... Show More
Publication Date
Mon Jun 01 2009
Journal Name
Engineering And Technology Journal
Synthesis and study of the Novel tetradented ligand type N2O2 and its complexes with (Mn (II) ,Co (II) ,Ni (II) and Cu(II)) ions
...Show More Authors

A new Schiff base ligand Bis-1,4-di[N-3-(2-hydroxy-1-amino)- acetophenonylidene] benzylidene [L] and its complexes with (Mn(II) ,Co(II) ,Ni(II and Cu(II)) were synthesized . The ligand was prepared in two steps. In the first step a solution of (terphthalaldehyde) in methanol reacts under reflux with (p-aminoacetophenone) to give an intermediate compound [1-[3-({4-[(3-Acetyl-phenylimino)-methyl]-benzylidene}-amino)-phenyl]- ethanone which reacts in the second step with (2-Amino-phenol) giving the mentioned ligand. The complexes were synthesized by addition the corresponding metal salt solution to the solution of the ligand in methanol under reflux in (1:1) metal to ligand ratio. On the basis of, molar conductance, I.R., UV-Vis, HPLC, chlorid

... Show More
Publication Date
Tue Oct 31 2023
Journal Name
Malaysian Journal Of Science
SYNTHESIS, PHYSICOCHEMICAL ELUCIDATION AND BIOLOGICAL SCREENING STUDY OF NEW LIGAND DERIVED FROM 5,6-O-ISO PROPYLIDENE-L-ASCORBIC ACID AND ITS METAL(II) COMPLEXES
...Show More Authors

A simple chemistry method approach was used to synthesise new ligand derivate from L-ascorbic acid and its complexes. All of them were water-soluble and are used quite extensively in the medical and pharmaceutical fields. This study synthesised the new ligand derivative from L-ascorbic acid-base using the following steps: A 5,6-O-isopropylidene-L-ascorbic acid was prepared by reacting dry acetone with L-ascorbic acid followed by reacting it with trichloroacetic acid to yield [chloro(carboxylic)methylidene]-5,6-O-isopropylidene-L-ascorbic acid in the second stage. In the third stage, the derivative was reacted with (methyl(6-methyl-2-pyridylmethyl)amine to create a new ligand (ONMILA). This novel ligand was identified using a number

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Synthetic Metals
Modeling tunnel currents in organic permeable-base transistors
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Anziam Journal
Flow from a source above a sloping base
...Show More Authors

We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Feb 22 2021
Journal Name
Educatum Journal Of Science, Mathematics And Technology
Effect of ammonia/gallium ratio and growth temperature towards the surface morphology of semi-polar GaN grown on m-plane sapphire via MOCVD
...Show More Authors

A single-crystalline semi-polar gallium nitride (11-22) was grown on m-plane (10-10) sapphire substrate by metal organic chemical vapor deposition. Three-step approach was introduced to investigate the grain size evolution for semi-polar (11-22) GaN. Such approach was achieved due to the optimized gallium to ammonia ratio and temperature variations, which led to high quality (11-22) oriented gallium nitride epilayers. The full width at half maximum values along (-1-123) and (1-100) planes for the overgrowth temperature of 1080°C were found to be as low as 0.37° and 0.49°, respectively. This was an indication of the enhanced coalescence and reduction in root mean square roughness as seen by atomic force microscopy. Surface analysi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref