Preferred Language
Articles
/
bsj-2396
Preparation and Characterization of Cu (II), Mn(II) and Zn(II)complexes with new sulfamethoxazole Compounds
...Show More Authors

Acetophenone sulfamethoxazole and 3-Nitrobenzophenone sulfamethoxazole were prepared from the reaction of sulfamethoxazole with two ketones. The prepared ligands were identified by (C.H.N) analysis and UV-VIS, FT-IR spectroscopic techniques. Metal complexes of the two ligands were prepared in an aqueous alcohol with Zn (II), Mn (II) and Cu (II) ions with a molar ratio1:1. The proposed general formula for the resulting complexes was [ML.CL2.H2O]H2O .The complexes were characterized by (C.H.N) technique , spectroscopic methods ,conductivity, atomic absorption ,magnetic susceptibility measurements and melting point. According to the results obtained, the suggested geometry is to be octahedral for all the complexes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 16 2021
Journal Name
Energies
Performance Analysis of a Solar Cooling System with Equal and Unequal Adsorption/Desorption Operating Time
...Show More Authors

In solar-thermal adsorption/desorption processes, it is not always possible to preserve equal operating times for the adsorption/desorption modes due to the fluctuating supply nature of the source which largely affects the system’s operating conditions. This paper seeks to examine the impact of adopting unequal adsorption/desorption times on the entire cooling performance of solar adsorption systems. A cooling system with silica gel–water as adsorbent-adsorbate pair has been built and tested under the climatic condition of Iraq. A mathematical model has been established to predict the system performance, and the results are successfully validated via the experimental findings. The results show that, the system can be operational

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
THE PREVALENCE AND ANTIMICROBIAL RESISTANCE OF PSEUDOMONAS SPECIES IN PATIENTS WITH CHRONIC SUPPURATIVE OTITIS MEDIA
...Show More Authors

Background: Chronic suppurative otitis media (CSOM) is the result of aninitial episode of acute otitis media and is characterized by a persistent discharge from the middle ear through a tympanic perforation for at least 2 weeks duration. It is an important cause of preventable hearing loss, particularly in the developing world.Methods. 1. To get an overview on the bacterial ear infection profile in general 2. To assess the antibiotic resistance of Pseudomonal infection (PS) particularly since it is usually the commonest infection to cause otitis media and the most difficult to treat due to the problem of multi drug resistance... A cross sectional study was done which included 405 patient of CSOM patients196 (48%) case were males ,209 (52

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 21 2019
Journal Name
Al-khwarizmi Engineering Journal
Design and Optimization of a Surface-Mounted Permanent-Magnet Linear Synchronous Motor with Maxwell ANSYS
...Show More Authors

Linear motor offers several features in many applications that require linear motion. Nevertheless, the presence of cogging force can deteriorate the thrust of a permanent magnet linear motor. Using several methodologies, a design of synchronous single sided linear iron-core motor was proposed. According to exact formulas with surface-mounted magnets and concentrated winding specification, which are relying on geometrical parameters. Two-dimensional performance analysis of the designed model and its multi-objective optimization were accomplished as a method to reduce the motor cogging force using MAXWELL ANSYS. The optimum model design results showed that the maximum force ripple was approximatrly reduced by 81.24%compared to the origina

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Nonlinear Finite Element Analysis of Steel Fiber Reinforced Concrete Deep Beams With and Without Opening
...Show More Authors

This paper presents a nonlinear finite element modeling and analysis of steel fiber reinforced concrete (SFRC) deep beams with and without openings in web subjected to two- point loading. In this study, the beams were modeled using ANSYS nonlinear finite element
software. The percentage of steel fiber was varied from 0 to 1.0%.The influence of fiber content in the concrete deep beams has been studied by measuring the deflection of the deep beams at mid- span and marking the cracking patterns, compute the failure loads for each deep beam, and also study the shearing and first principal stresses for the deep beams with and without openings and with different steel fiber ratios. The above study indicates that the location of openings an

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Jan 09 2019
Journal Name
Journal Of The College Of Education For Women
Mental Strain and its Relationship with the Attitude towards the Immigration of the University Students
...Show More Authors

the appearance and increasing of the young immigration within 2015, the researcher intuition as a mother and part of the society, and the role of the psychological attitude in enabling the individual to make decision, in the light of all the above come up the need for studying this problem.
The study aims at finding out:
1. The mental strain of the study sample.
2. The differences in mental strain of the study sample according to the gender, specification, the university, the study (private, not private), and if they have immigrated friends or relatives out of the Iraq.
3. The study sample attitudes towards immigration.
4. The study sample levels of attitudes towards immigration.
5. The differences in the sample attitud

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Basrah Journal Of Agricultural Sciences
Diesel Engine Efficiency under Varying Loads and Engine Oil Contaminated with Safe levels of Glycol
...Show More Authors

Although allowable amounts of glycol contamination in diesel engine oil, no research has been conducted on how these levels and varying loads affect engine performance. The research used a four-stroke diesel engine to investigate the effect of different glycol contamination levels (0, 120, and 220 ppm) under two engine loads (4.5 and 9 kW). Brake specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature were measured to determine the engine performance. The experiment used the factorial arrangement in a completely randomized design (CRD) with three replicates. Increasing the contamination levels from 0 to 120 and then to 220 ppm under constant engine load significantly increased brake specific fuel con

... Show More
Preview PDF
Scopus
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detecting Keratoconus by Using SVM and Decision Tree Classifiers with the Aid of Image Processing
...Show More Authors

 Researchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref