Preferred Language
Articles
/
RBaUi4kBVTCNdQwCMYuG
New Series of Substituted Heterocyclics Derived from α , β – Unsaturated Ketone and Their Cytotoxic Activity Tumor Cell Lines
...Show More Authors

The aldol condensation of 2-acetylnaphthalene with 9-anthracene carboxaldehyde afforded α, β-unsaturated keton (1) . New heterocyclic compounds containing: cyclohexenone[2], indazole[3], pyrimidinethion [4], thiazolo fused pyrimidine[5], isoxazoline[6], substituted pyrazoline[7]a-d and pyrimidinone[8] rings system were synthesized from α, β-unsaturated keton[1]. Cyclization of [1] with ethylacetoacetate gave the mentioned heterocycle cyclohexanone [2]. The cyclo condensation of [2] with hydrazine gave the new indazole derivative [3]. furthermore, the reation of [1]with thiourea gives thiopyrmidine derivative [4]. The cyclo condensation of [4] with chloroacetic acid gave the fused rings [5]. Then reacted compound[1] with hydroxylamine to produce isoxazoline [6]. Also the reaction of [1]with hydrazine and hydrazide derivatives to produce pyrazole [7]a-d. All the newly synthesized derivatives[2-7a-d] were characterized via the CHN-S, FT- IR, 1H NMR, and13C NMR (of some of theme). The antibacterial and cytotoxic activities were evaluated for these derivatives[2-7a-d] . The study of antibacterial displayed good to moderate activity and the study of anticancer activity showed that were effective for inhibition of L20 B the mice intestines carcinoma cell line and RD human pelvic rhabdomyosarcoma cell line. Treated.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jan 22 2026
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte, Issn 1886-8576, Vol. 17, Nº. 6, 2022, Págs. 391-395
A study of mental perception and sports confidence and their relationship to the motivation of sports achievement for the players of the Iraqi premier league football clubs
...Show More Authors

Autorías: Nuha Mohsin Dhahi, Ahmed Thare Hani, Muwafaq Obayes Khudhair. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
Hetero-associative Memory Based New Iraqi License Plate Recognition
...Show More Authors

As a result of recent developments in highway research as well as the increased use of vehicles, there has been a significant interest paid to the most current, effective, and precise Intelligent Transportation System (ITS). In the field of computer vision or digital image processing, the identification of specific objects in an image plays a crucial role in the creation of a comprehensive image. There is a challenge associated with Vehicle License Plate Recognition (VLPR) because of the variation in viewpoints, multiple formats, and non-uniform lighting conditions at the time of acquisition of the image, shape, and color, in addition, the difficulties like poor image resolution, blurry image, poor lighting, and low contrast, these

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Archives Of Medical Research
Galectins: A New Frontier in Gastroesophageal Reflux Disease Research
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
New Approach for Solving (1+1)-Dimensional Differential Equation
...Show More Authors

View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.