Preferred Language
Articles
/
bsj-2576
sw uobaghdad edu iqSynthesis and Characterization of Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II) Complexes with Symmetrical Schiff base
...Show More Authors

New binuclear Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II) Complexes of N2S2 tetradentate or N4S2 hexadentate symmetric Schiff base were prepared by the condensation of butane-1,4-diylbis(2-amino ethylcarbamodithioate) with 3-acetyl pyridine. The complexes having the general formula [M2LCl4] (where L=butane-1,4-diyl bis (2-(z)-1-(pyridine-3-ylethylidene amino))ethyl carbamodithioate, M= Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II)), were prepared by the reaction of the mentioned metal salts and the ligand. The resulting binuclear complexes were characterized by molar conductance, magnetic susceptibility ,infrared and electronic spectral measurements. This study indicated that Mn(II), Ni(II) and Cu(II) complexes have octahedral geometry, while Co(II) Zn(II) and Hg(II) complexes are proposed to be tetrahedral structure .K

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of Mechanical and Histological Significance of Nano Hydroxyapatite and Nano Zirconium Oxide Coating On the Osseointegration of CP Ti Implants
...Show More Authors

Background: Dental implant considers a unique treatment option for the replacement of missing dentition. The new trend of implants is looking for materials which accelerate bone formation in bone implant interface and enhance osseointegration to provide immediate loading directly after placement and decrease the time period which is disturbs patients and uncomfortable. The aim of the study was to evaluate the effect of nano zirconium oxide (ZrO2) and nano hydroxyapatite (Hap) mixture coating of screw shaped commercially pure titanium (cpTi) implants on bond strength at the bone implant interface with torque removal test and histological analysis in comparison with non coated implants. Materials and methods: Forty screws were machined from c

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Feb 25 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 PARTIAL PURIFICATION OF BACTERIOCIN PRODUCED FROM PEDIOCOCCUS ACIDILACTICI-FMAC278 AND WEISSELLA PARAMESENTEROIDES-DFR6 AND ITS APPLICATION IN THE PRESERVATION OF CHICKEN SAUSAGES: PARTIAL PURIFICATION OF BACTERIOCIN PRODUCED FROM PEDIOCOCCUS ACIDILACTICI-FMAC278 AND WEISSELLA PARAMESENTEROIDES-DFR6 AND ITS APPLICATION IN THE PRESERVATION OF CHICKEN SAUSAGES
...Show More Authors

Bacteriocins were partially purified by ammonium sulphate 50% concentraction, bacteriocin activity of Pediococcus acidilactici-FMAC278 was 25600 U/ml with 5.8 folds and 7.6% yeild, the activity decrease to 12800 U/ml after dialysis with 6.3 folds and 3% yield, On the other hand the bacteriocin activity of Weissella paramesenteroides-DFR6 was 12800 U/ml with 2.7 folds and 8.8% yeild, after dialysis the activity became 6400 U/ml with 5.1 fold and 3.4% yield, Chicken Sausage were made by adding 0.25, 0.5 and 1% particaly purified bacteriocin to study its effect on microorganisms and increasing shelf life of Sausage. It is found that bacterial numbers were decreased after 3 days of storage at refrigerator at 0.5% conc. While the molds decrea

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Engineering
CURVATURE DUCTILITYOF REINFORCED CONCRETE BEAMSECTIONS STIFFENED WITH STEEL PLATES
...Show More Authors

Publication Date
Sun Dec 31 2023
Journal Name
Journal Of Pioneering Medical Science
Nurses' Perception Toward Therapeutic Strategies for Children with Pneumonia
...Show More Authors

Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
On Skew Left n-Derivations with Lie Ideal Structure
...Show More Authors

In this paper the centralizing and commuting concerning skew left -derivations and skew left -derivations associated with antiautomorphism on prime and semiprime rings were studied and  the commutativity of Lie ideal under certain conditions were proved.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Iraqi Postgraduate Medical Journal
Angiolymphoid hyperplasia with eosinophilia (pseudopyogenic granuloma) among Iraqi patients
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1

View Publication
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Compared to wireless deployment in areas with different environmentse
...Show More Authors

<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz

... Show More
View Publication
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref