Preferred Language
Articles
/
RBexZpABVTCNdQwCo4kO
SYNTHESIS AND SPECTROSCOPIC CHARACTERIZATION OF NEW HETEROCYCLIC COMPOUNDS DERIVATIED FROM 1-(4-AMINOPHENYL) ETHAN-1-ONEOXIME AS A STARTING MATERIAL WITH EVALUATE THEIR BIOLOGICAL ACTIVITY
...Show More Authors

ABSTRACT : This research involves the synthesis of five to seven heterocyclic compounds starting with Schiff’s bases which derived from oxime as a starting material. 1.3-oxazepine derivatives were prepared from adding different anhydrides to the Schiff bases, tetrazole and thiazolidinone derivatives synthesized from add sodium azide and thioglycolic acid to the same Schiff’s bases as a five members ring. Pyrimidine derivatives were prepared after the reaction of the azomethine group with acetyl chloride and then urea and thiourea to synthesis on derivatives contain the six members ring. Another step included identified and confirmed these compounds by FT- IR, 1HNMR, TLC and 13CNMR finally, step included the assay of biological activity of some compounds against four types of bacteria (Staphylococcus aureus, Bacillus subtilis) Gram-positive and (E. coli, Pseudomonas aeruginosa) Gram-negative and one type of fungal Candida albicans, and the results biological activity was compared with antibiotics (Ampicillin).

Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Uptake of Fluoride from Water Using Recycled Raw Beef Bone as an Environmently Freindly Waste
...Show More Authors

Excessive intake of fluoride, mainly through drinking water is a serious health hazard affecting humans worldwide. In this study, the defluoridation capacities of locally available raw waste beef bones have been estimated. Several experimental parameters including contact time, pH, bone dose, fluoride initial concentration, bone grains size, agitation rate, and the effect of co-existence of anions in actual samples of wastewater were studied for fluoride removal from aqueous solutions. Results indicated excellent fluoride removal effeciency up to 99.7% at fluoride initial concentration of 10 mg F/L and 120 min contact time. Maximum fluoride uptake was obtained at neutral pH range 6-7. Fluoride removal kinetic was well described by the ps

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 14 2021
Journal Name
Biosense Dementia 2017 - International Workshop On Biosensors For Dementia From 13 – 14 June 2017 – Plymouth University, Plymouth, Uk
Changes in the Electroencephalogram as a Biomarker of Alzheimer’s Disease
...Show More Authors

The rapid increase in the number of older people with Alzheimer’s disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems because of a large number of people affected. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available, and to plan for the future. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage caused to the brain due to AD leads t

... Show More
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (34)
Crossref (21)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Animal Nutrition And Feed Technology
Insect Meal as a Source of Protein in Animal Diet
...Show More Authors

View Publication
Scopus (26)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Agriculture And Biology
Molecular Characterization of a Leaf Curl Disease Infecting Zucchini Squash in Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Anais Da Academia Brasileira De Ciências
Molecular characterization of viruses associated to leaf curl disease complex on zucchini squash in Iraq reveals Deng primer set could distinguish between New and Old World Begomoviruses
...Show More Authors

View Publication
Scopus (16)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Jun 03 2025
Journal Name
Journal Of Umm Al-qura University For Applied Sciences
Application of Benesi–Hildebrand and Tauc approaches of new synthesized Schiff bases interacted with two types of electron acceptors modules
...Show More Authors

This study has three parts, the first one is the synthesis of a novel Schiff bases by the condensation of guanine or 9-[{2-hydroxyethoxy}methyl]-9H-guanine with variety aldehydes to yield four different bases as follows: (E)-2-((4-nitrobenzylidene)amino)-1,9-dihydro-6H-purin-6-one (S1), (E)-2-((4-methoxybenzylidene)amino)-1,9-dihydro-6H-purin-6-one (S2), (E)-2-((2-hydroxybenzylidene) amino)-9-((2-hydroxy ethoxy)methyl)-1,9-dihydro-6H-purin-6-one (S3), and (E)-2-(((9-((2-hydroxy ethoxy)methyl)-6-oxo-6,9-dihydro-1H-purin-2-yl)imino)methyl)benzoic acid (S4). Then, spectroscopic analyses such as Elemental Analysis, UV/VIS, Mass spectra, FTIR, 1H,13C-NMR were made to recognize these bases. In the second part, the ability of synthesized bases to

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref