Preferred Language
Articles
/
bsj-2148
Synthesis and Characterization of Some New Metals Complexes of [N-(4-Nitrobenzoyl Amino)-Thioxomethyl] Phenylalanine
...Show More Authors

A new ligand [N-(4-nitrobenzoylamino)-thioxomethyl] phenylalanine is synthesized by reaction of 4-nitrobenzoyl isothiocyanate with phenylalanine (1:1). It is characterized by micro elemental analysis (C.H.N.S.), FT-IR, (UV-Vis) and 1H and 13CNMR spectra. Some metals ions complexes of this ligand were prepared and characterized by FT-IR, UV-Visible spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From results obtained, the following formula [M(NBA)2] where M2+ = Mn, Co, Ni, Cu, Zn, Pd, Cd and Hg, the proposed molecular structure for these complexes as tetrahedral geometry, except copper and palladium complexes are have square planer geometry.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Synthesis of Carbon Nano Rods from Plastic Waste (PP) Using MgO AS A Catalyst
...Show More Authors

    In this research, CNRs have been synthesized using pyrolysis of plastic waste(pp) at 1000 ° C for one hour in a closed reactor made from stainless steel, using magnesium oxide (MgO) as a catalyst. The resultant carbon nano rods were purified and characterized using energy dispersive X-ray spectroscopy (EDX), X-ray powder diffraction (XRD). The surface characteristics of carbon rods were observed with the Field emission scanning electron microscopy (FESEM). The carbon was evenly spread and had the highest concentration from SEM-EDX characterization. The results of XRD and FESEM have shown that carbon Nano rods (CNRs) were present in Nano figures, synthesized at 1000 ° C and with pyrolysis temperature 400° C. One of t

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Oct 18 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY OF THE TEMPORAL EFFECT OF THE LEVEL OF THE CREATINE KINASE ENZYME CK-MB AND SOME BIOMARKERS IN PATIENTS WITH MYOCARDIAL INFARCTION AND HEART FAILURE IN RAMADI CITY: STUDY OF THE TEMPORAL EFFECT OF THE LEVEL OF THE CREATINE KINASE ENZYME CK-MB AND SOME BIOMARKERS IN PATIENTS WITH MYOCARDIAL INFARCTION AND HEART FAILURE IN RAMADI CITY
...Show More Authors

The current study is designed to achieve the goal of early detection of heart disease because it is the main risk of death. Some biomarkers were measured as well as the percentage of the effect of certain risk factors in people with myocardial infarction and heart failure. The study included 40 serum samples from people with heart disease. The effectiveness of the creatine kinase (CK-MB), as well as its temporal and albumin effects, as well as sodium ions in people with myocardial infarction and heart failure, were compared with the control group. as shown below:

-The first group consisted of 25 blood samples from people with myocardial infarction and 15 serum samples from people with heart failure. Blood

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MOLECULAR CHARACTERIZATION OF CONTRACAECUM RUDOLPHII HARTWICH, 1964 (NEMATODA: ANISAKIDAE) FROM THE CORMORANT PHALACROCORAX CARBO IN IRAQ
...Show More Authors

Contracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS-1 (rD

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum
MOLECULAR CHARACTERIZATION OF CONTRACAECUM RUDOLPHII HARTWICH, 1964 (NEMATODA: ANISAKIDAE) FROM THE CORMORANT PHALACROCORAX CARBO IN IRAQ
...Show More Authors

Contracaecum rudolphii Hartwich, 1964 is a nematode which causes major concerns to human and wildlife animal’s health. However, the population genetics of C. rudolphii has been poorly studied in Iraq. In order to gain a deeper understanding in the outline of the genetic diversity of the nematode C. rudolphii that were isolated from its host cormorant Phalacrocorax carbo (Linnaeus, 1758), in the middle areas of Iraq, twenty specimens of C. rudolphii adults were isolated from nine individuals of P. carbo. The first (ITS-1) internal transcribed spacers (ITS) of ribosomal DNA (rDNA) of C. rudolphii were amplified using conventional polymerase chain reaction (PCR); then, the amplicons were subjected to sequencing. Concatenation of ITS

... Show More
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
New Commands to Improve the Monitor for the ELWE Microcomputer
...Show More Authors

The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.

View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
New algorithms to Enhanced Fused Images from Auto-Focus Images
...Show More Authors

Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref