Preferred Language
Articles
/
bijps-1022
Synthesis and Preliminary Biological Activity Evaluation of New N- Substituted Phthalimide Derivatives
...Show More Authors

A

A new series of bases of Schiff (H2-H4) derived from phthalic anhydrideweresynthesized. These Schiff bases were prepared by the reaction of different amines (tyrosine methyl ester, phenylalanine methyl ester, and isoniazid) with the phthalimide derived aldehyde with the aid of glacial acetic acid or triethylamine ascatalysts. All the synthesized compounds were characterized by (FT-IR and 1HNMR) analyses and were in vitro evaluated for their antimicrobial activity against six various kinds of microorganisms. All the synthesized compounds had been screened for their antimicrobial activity against two Gram-positive bacteria “Staph. Aureus, and Bacillus subtilis”, two Gram-negative bacteria “Escherichia coli, and Klebsiella pneumoniae”, and two fungi species “Candida tropicalis and Candida albicans” using concentrations of 62.5, 125 and 250 µg\mLof derivative in dimethyl sulfoxide(DMSO). All the synthesized compounds showed no activity at all against Gram-positive bacteria, for Gram-negative bacteria and fungi they showed moderate or no activity except compound H1revealedhigh antifungal activityagainstCandida tropicalisat concentrations 125 and 250 µg\ mL.

Keywords: Schiff base, phthalic anhydride, antimicrobial.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Evaluation of Fludarabine, and granulocyte colony stimulating factor in treatment of efractory/Relapsed Acute Leukemias in adult Iraqi patients
...Show More Authors

Background: Refractory/relapsed acute leukemia has always been a challenging problem for hematologist. Over the past decade emphasis has been made in the development of regimens containing fludarabine, combined with cytosine arabinoside for the treatment of refractory/relapsed acute leukemias. The aim of this study is to evaluate the efficacy and toxicity of the combination of fludarabine, high dose cytarabine, and granulocyte colony stimulating factor in refractory relapsed cases of acute leukaemia,
Methods: a prospective study is being conducted at the national center of hematology and hematology unit /Baghdad teaching hospital from July 2008 to July 2010.Twenty Patients with refractory/relapsed acute leukemia were treated with flud

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2025
Journal Name
Journal Of Engineering
Experimental Evaluation of Free-Fall Gravity Drainage in Water-Drive Reservoirs: Impact of Aquifer Strength and Reservoir Heterogeneity/Homogeneity
...Show More Authors

This study experimentally investigated Free-Fall Gravity Drainage (FFGD) under combination-drive conditions in a two-dimensional Hele-Shaw model representing a water-drive reservoir. An initially high gravity potential from the oil column enabled early oil drainage before aquifer support became dominant. Three water-drive strengths were tested, demonstrating that a stronger aquifer (1.15 psig) accelerated oil recovery to approximately 75% of the original oil in place (OOIP) within 60 minutes, resulting in a final recovery of 79.5%. However, this was accompanied by rapid water breakthrough after 2.5 minutes and high-water cuts exceeding 90%. In contrast, a weaker aquifer (0.725 psig) stabilized the oil–water contact, delaying w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
International Journal Of Drug Delivery Technology
Evaluation of Antibacterial and Cytotoxicity Properties of Zinc Oxide Nanoparticles Synthesized by Precipitation Method against Methicillin-resistant Staphylococcus aureus
...Show More Authors

A novel technique for nanoparticles with a chemical method and impact for resistance bacteria methicillin-resistant Staphylococcus aureus (MRSA), UV-visible analysis confirmed the by Fourier transform infrared spectroscopy (FT-IR) and Energy dispersive X-Ray (EDX), Scanning electron microscope (SEM) and X-ray diffraction pattern estimation antimicrobial excellent antibacterial activity against MRSA (with zone of inhibition of 11 ± 02 mm , 9 ± 01 mm,8 ± 03 mm and 7.5 ± 02 mm and 6.5 ± 02 mm) at different concentrations (0.5 ,0.25, 0.125, 0.0625, 0.03125) mg/ml while good activity was 16 ± 03 mm at 17 ± 02 mm zone at 0.25, 0.125 mg/mL, respectively. The increase in microorganism resistance to antibiotics a couple of have caused

... Show More
View Publication
Scopus (13)
Crossref (7)
Scopus Crossref
Publication Date
Sat Sep 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the efficacy of ultrasound in the diagnosis of cervical lymphadenopathy
...Show More Authors

Background: Cervical lymph nodes are prone to involved by a number of pathologic processes. They are common sites for lymphoma, metastasis, and reactive enlargement in a number of conditions. Aims of the study:-Clinical evaluation of patients with cervical lymphadenopathy. Differentiation between benign and malignant lymph nodes by means of ultra sounds (US) and Correlate the US findings with cytological and/or histopathological findings of cervical lymph nodes. Subjects, Materials and Methods:-The present study was carried out over a period of 6 months and included 81 patients of different age groups presenting with cervical lymphadenopathy. Each patient was examined clinically, then comprehensive sonographic examination of the neck for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
New Commands to Improve the Monitor for the ELWE Microcomputer
...Show More Authors

The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
New algorithms to Enhanced Fused Images from Auto-Focus Images
...Show More Authors

Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref