Preferred Language
Articles
/
bsj-2773
Synthesis and Characterization of New Heterocyclic Compounds from 2, 5- dimercapto -1, 3, 4-Thiadiazole and Their Resins
...Show More Authors

In this research, a new 1, 3, 4-Thiadiazole derivatives have been synthesized by many heterocyclic reactions. Starting from (2, 5 – dimercapto -1, 3, 4-Thiadiazole) a variety of derivatives have been synthesis. Compound (1) was synthesized by the reaction of hydrazine hydrate with carbon disulphide in absolute ethanol. The compound (1) was reacted with 1, 2-dibromoethane in presence of alkali ethanol to give the compound (2). The compound (3) was formed from the reaction of compound (2) with hydrazine hydrate. Schiff base (4) was obtained by reacting of compound (3) with the compound (p-hydroxybenzaldehyde) in absolute ethanol. A variety of phenolic Schiff base (Methylolic, Etheric, and Epoxy) derivatives have been synthesized. Methylolic derivative was synthesized by the reaction of Schiff base (4) with formaldehyde in tetrahydrofuran (THF). Etheric derivative was formed from the reaction of a methylolic Schiff base (5) with saturated alcohol (Methanol).Epoxy derivative was synthesized by the reaction of epichlorohydrine with etheric derivative (6) .The last step of this research was the preparation of a composite material from mixing the Epoxy resin derivative(7), TiO2and morpholine via ring opening. All these derivatives were verified by using (FT-IR, UV) spectra photometer and 1H-NMR spectra. Also, these derivatives were characterized using elemental analysis (C.H.N.S) .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
HAEMOPROTEIDS OF THE AVIAN FAMILY RALLIDAE IN IRAQ WITH DESCRIPTION OF A NEW SPECIES
...Show More Authors

A survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.

View Publication Preview PDF
Publication Date
Wed Oct 10 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
TWO NEW RECORDS OF DWARF SNAKES OF THE GENUS EIRENIS JAN, (REPTTILIA, COLUBRIDAE) IN IRAQI KURDISTAN (NORTH AND NORTHEASTERN OF IRAQ) WITH ANNOTATED CHECKLIST, FOR THE GENUS EIRENIS IN IRAQ
...Show More Authors

    Two dwarf snakes were discovered, Eirenis thospitis Schmidtler & Lanza from Sereen mountain, north east of Arbil  and E. rothii Jan from Saffin mountain North of Arbil  city  North of Iraqi Kurdistan. Supported by description and important notes on variation. In addition summarized list for 9 species of the genus Eirenis Jan in Iraq is also presented.  

View Publication Preview PDF
Publication Date
Wed Feb 11 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of transforming growth factor beta one (TGF-?1) immunohistochemical (IHC) expression profile in the gingival tissue of patients with different forms of periodontal diseases
...Show More Authors

Background: This study evaluate the immunohistochemical expression profile of transforming growth factor beta-1 in inflamed gingival tissue of patients with gingivitis and chronic periodontitis compared to healthy subjects and, determine the correlation between this cytokine and the clinical periodontal parameters, intensity of inflammation and chronic periodontitis severity. Materials and methods: Gingival tissue specimens were taken from 23 chronic periodontitis patients, 20 gingivitis patients and 20 periodontally healthy subjects. The periodontal status was evaluated by dichotomous measurements of the clinical periodontal parameters (PLI, GI, BOP, PPD, CAL). The gingival specimens were fixed immediately in 10% formalin and processed ro

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
New Commands to Improve the Monitor for the ELWE Microcomputer
...Show More Authors

The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref