Preferred Language
Articles
/
QBcajJIBVTCNdQwCjrWe
Synthesis, Characterization of New Isatin-Ibuprofen Derivatives with Expected Biological Activity
...Show More Authors

Ibuprofen is one of the most important members of NSAIDs, named aryl propionic acid derivative. Isatin (1H-indole-2,3-dione) is an important molecule of heterocyclic compounds that have many biological activities. This work illustrates the synthesis of new ibuprofen-isatin derivatives by connecting ibuprofen hydrazide with different isatin derivatives by a condensation reaction, followed by characterization by fourier-transform infrared spectroscopy (FTIR) and proton nuclear magnetic resonance (1H-NMR) spectroscopy. The anti-inflammatory activity was evaluated by using the egg-white induce edema method for all the synthesized compounds (5-8), the compounds 5 and 6 showed better anti-inflammatory activity than ibuprofen as a standard compound. Their antimicrobial activity was evaluated and compared with ciprofloxacin, ampicillin, and fluconazole; the compounds 5 and 7 have moderate antibacterial activity against gram-positive and gram-negative bacteria, with lower antifungal activity.

Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 29 2021
Journal Name
Research Journal Of Pharmacy And Technologythis Link Is Disabled.
Exploration of a new fluoride resistance gene (Fram gene) in oral streptococcus mutans maw
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A NEW SPECIES OF THE GENUS POLLENIA ROB.-DESVOIDY, 1830 (DIPTERA : CALLIPHORIDAE) FROM IRAQ
...Show More Authors

This research includes a detailed morphological description of the Pollenia mesopotamica sp. nov. in Iraq. Locality, host plant and data of collection were given.

View Publication Preview PDF
Publication Date
Mon Aug 18 2025
Journal Name
Journal Of Genetic And Environment Conservation
Ultrasound application as a new green technology for preservation of table eggs: A review
...Show More Authors

In recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A New Two Derivative FSAL Runge-Kutta Method of Order Five in Four Stages
...Show More Authors

A new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Noor's Curve, a New Geometric Form of Agnesi Witch, a Construction Method is Produced
...Show More Authors

In this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Research Journal Of Pharmacy And Technology
Effect different concetration and pH on complexes formation of New Tetradentate Schiff base Ligand
...Show More Authors

New N2O2 donor kind Schiff basehas been destined and structured by reaction Ampyrone with O-hydroxyacetophenone and Anthranilic acid. The metal complexes of the Schiff base with Mn(II), Hg(II), Ni(II), Cu(II), and Co(II) metal ions were designed and characterized by magnetic susceptibility, elemental analyses, molar conduction, IR, and 1H NMR,UV-Vis spectral metrics.The UV-Vis. and magnetic susceptibility data of the complexes suggest a square-planar, tetrahedraland octahedral geometries around the central metal ions. All elaborations were accomplished after determination the optimum molar concentration and pH which followed law of Lambert-Beer's in the researches pH scopes. The composition of these complexes were conclude dapprobating to t

... Show More
Scopus (1)
Scopus