Preferred Language
Articles
/
NxdKiY4BVTCNdQwCh0x-
Spectrophotometric Method for Determination of Cu(II) Using a New Schiff Base Ligand
...Show More Authors

The Cu(II) was found using a quick and uncomplicated procedure that involved reacting it with a freshly synthesized ligand to create an orange complex that had an absorbance peak of 481.5 nm in an acidic solution. The best conditions for the formation of the complex were studied from the concentration of the ligand, medium, the eff ect of the addition sequence, the eff ect of temperature, and the time of complex formation. The results obtained are scatter plot extending from 0.1–9 ppm and a linear range from 0.1–7 ppm. Relative standard deviation (RSD%) for n = 8 is less than 0.5, recovery % (R%) within acceptable values, correlation coeffi cient (r) equal 0.9986, coeffi cient of determination (r2) equal to 0.9973, and percentage capital R-squared explained variation as a percentage/total variation (R2%) equal to 99.73. The method has been successfully applied for the estimation of Cu(II) ions without the infl uence of other interfering ions, and it can be applied to estimate Cu(II) in any sample.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Inorganic Chemistry Communications
Study the application of new type green corrosion inhibitors for iron metal
...Show More Authors

Density functional theory (DFT) calculations were used to evaluate the capability of Glutamine (Gln) and its derivative chemicals as inhibitors for the anti-corrosive behavior of iron. The current work is devoted to scrutinizing reactivity descriptors (both local and global) of Gln, two states of neutral and protonated. Also, the change of Gln upon the incorporation into dipeptides was investigated. Since the number of reaction centers has increased, an enhancement in dipeptides’ inhibitory effect was observed. Thus, the adsorption of small-scale peptides and glutamine amino acids on Fe surfaces (1 1 1) was performed, and characteristics such as adsorption energies and the configuration with the highest stability and lowest energy were ca

... Show More
View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Proposition of New Ensemble Data-Intelligence Models for Surface Water Quality Prediction
...Show More Authors

View Publication
Scopus (84)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Wed Jul 23 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Olive Oil as a Separating Medium and Its Effect on Some Mechanical Properties of Processed Acrylic Resin Denture Base (A Comparative Study). Part Two
...Show More Authors

Background: During acrylic resin processing, the mold must be separated from the surface of the gypsum to prevent liquid resin from penetrating into the gypsum, and water from the gypsum seeping into the acrylic resin. For many years, tin foil was the most acceptable separating medium, and because it's difficult to apply, a tin-foil substitute is used. In this study, olive oil is used as an alternative to tin foil separating medium for first time, and evaluating its effect as a separating medium on some mechanical properties such as (indentation hardness and transverse strength) of acrylic resins denture base comparing it with those processed using tin-foil and tin foil substitute such as (cold mold seal) separating medium. Materials and M

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 28 2023
Journal Name
The Journal Of Physical Chemistry A
Tubular Magnetic Shielding Scan (TMSS): A New Technique for Molecular Space Exploration. (i) The Case of Aromaticity of Benzene and [<i>n</i>]Paracyclophanes
...Show More Authors

Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
Developing Tenth Grade Female Students' Attitudes in Critical Reading Skills Using the Reflective Thinking Method in the Sultanate of Oman
...Show More Authors

        This study aimed to developing the skills of critical reading for the tenth basic school female students through a training program using the reflective thinking method. The study sample consisted of (64) students. To achieve the objective of the study, the researcher uses the quasi-experiment approach consisting of a control group (32 students) and an experimental group (32 students). The researcher used three research inventories as follows: 1) A list of critical reading skills included (30) skills within three aspects (Recognition – Deduction – Evaluation and Judgment). 2) An executive program using reflective thinking for developing critical reading skills. 3) Achievement test to measure

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Multiple Mixing Ratios of Gamma Rays Reaction 32 70 70 33 Ge p n As (, ) γ Using a2-ratio Method.
...Show More Authors

The δ-mixing of γ-transitions in 70As populated in the 32 70 70 33 Ge p n As (, ) γ reaction is calculated in the present work by using the a2-ratio methods. In one work we applied this method for two cases, the first one is for pure transition and the sacend one is for non pure transition, We take into account the experimental a2-coefficient for previous works and δ -values for one transition only.The results obtained are, in general, in a good agreement within associated errors, with those reported previously , the discrepancies that occur are due to inaccuracies existing in the experimental data of the previous works.

Publication Date
Thu Oct 01 2009
Journal Name
Journal
Ventral penile papillae as a new anatomical structure: a clinical-epidemiological study among Iraqi males
...Show More Authors

S Khalifa E, AR Jamal R, N Adil A, J Munqithe M…, 2009

View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Postgraduate Medical Journal
Ventral Penile Papillae as a New Anatomical Structure: A Clinical-Epidemiological Study Among Iraqi Male
...Show More Authors

KE Sharquie, JR Al-Rawi, AA Noaimi, MM Jabir, Iraqi Postgraduate Medical Journal, 2009

View Publication
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Determination of Critical-Sampling Scheme of Preprocessing for Multiwavelets Decomposition as 1st and 2nd Orders of Approximations.
...Show More Authors

One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.

The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.

 For data compression, where one is trying to find compact transform representations for a

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref