Preferred Language
Articles
/
bsj-2938
Spectroscopic Studies and Thermal Analysis of New Azo Dyes Ligands and their Complexes with some Transition of Metal Ions
...Show More Authors

New Azo ligands HL1 [2-Hydroxy-3-((5-mercapto-1,3,4-thiadiazol-2-yl)diazenyl)-1-naphth aldehyde] and HL2 [3-((1,5-Dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-yl)diazenyl)-2-hydroxy-1-naphthaldehyde] have been synthesized from reaction (2-hydroxy-1-naphthaldehyde) and (5-amino-1,3,4-thiadiazole-2-thiol) for HL1 and (4-amino-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one) for HL2. Then, its metal ions complexes are synthesized with the general formula; [CrHL1Cl3(H2O)], [VOHL1(SO4)] [ML1Cl(H2O)] where M = Mn(II), Co(II), Ni(II) and Cu(II), and general formula; [Cr(L2)2 ]Cl and [M(L2)2] where M = VO(II), Mn(II), Co(II), Ni(II) and Cu(II) are reported. The ligands and their metal complexes are characterized by phisco- chemical spectroscopic techniques (FT.IR, Mass, UV-Vis, 1H and 13C-NMR, TGA, (C.H.N.), molar conductivity, Atomic Absorbance, Chloride containing magnetic susceptibility). The spectral data suggest that the (HL1) behaves as a bidentate ligand in all complexes, whereas (HL2) behaves as a tridentate ligand for all complexes; bidentate ligand in Vanadium complex is coordinated with the metal ions through azo nitrogen and oxygen atoms. Theoretical studies of these ligands and their metal complexes in gas phase using Hyper chem.8. Studies of these compounds are prepared for their bacterial activity

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Improving the Iraqi Oil Well Cement Properties Using Barolift: an Experimental Investigation
...Show More Authors

Cement is a major component in oil and gas drilling operations that is used to maintain the integrity of boreholes by preventing the movement of formation fluids through the annular space and outside the casing. In 2019, Iraq National Oil Company ordered all international oil and gas companies which are working in Iraq to use Iraqi cement (made in Iraq) in all Iraqi oil fields; however, the X-ray fluorescence (XRF) and compressive strength results in this study show that this cement is not matching with American Petroleum Institute (API) standards.

During this study, barolift was used to improve the properties of Iraqi cement used in oil wells at high pressure and high temperature (HPHT). Barolift (1 g) was added to cement admixt

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 18 2010
Journal Name
Spe Projects, Facilities & Construction
Correlating Optimum Stage Pressure for Sequential Separator Systems
...Show More Authors
Summary<p>A study to find the optimum separators pressures of separation stations has been performed. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid is discharged from a higher-pressure separator into the lower-pressure separator. The set of working separator pressures that yields maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures, which is the target of this work.</p><p>A computer model is used to find the optimum separator pressures. The model employs the Peng-Robinson equation of state (Peng and Robinson 1976) for volatile oil. The application of t</p> ... Show More
View Publication
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Wed Jul 12 2023
Journal Name
Energies
Finite Time Disturbance Observer Based on Air Conditioning System Control Scheme
...Show More Authors

A novel robust finite time disturbance observer (RFTDO) based on an independent output-finite time composite control (FTCC) scheme is proposed for an air conditioning-system temperature and humidity regulation. The variable air volume (VAV) of the system is represented by two first-order mathematical models for the temperature and humidity dynamics. In the temperature loop dynamics, a RFTDO temperature (RFTDO-T) and an FTCC temperature (FTCC-T) are designed to estimate and reject the lumped disturbances of the temperature subsystem. In the humidity loop, a robust output of the FTCC humidity (FTCC-H) and RFTDO humidity (RFTDO-H) are also designed to estimate and reject the lumped disturbances of the humidity subsystem. Based on Lyapunov theo

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Glaucoma Diagnosis Based on Retinal Fundus Image: A Review
...Show More Authors

    Glaucoma is one of the most dangerous eye diseases. It occurs as a result of an imbalance in the drainage and flow of the retinal fluid. Consequently, intraocular pressure is generated, which is a significant risk factor for glaucoma. Intraocular pressure causes progressive damage to the optic nerve head, thus leading to vision loss in the advanced stages. Glaucoma does not give any signs of disease in the early stages, so it is called "the Silent Thief of Sight". Therefore, early diagnosis and treatment of retinal eye disease is extremely important to prevent vision loss. Many articles aim to analyze fundus retinal images and diagnose glaucoma. This review can be used as a guideline to help diagnose glaucoma. It presents 63 artic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Limits between the Cosmological Parameters from Strong Lensing Observations for Generalized Isothermal Models
...Show More Authors

This paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
Boosting E-learner’s Motivation through Identifying his/her Emotional States
...Show More Authors

The main objective of e-learning platforms is to offer a high quality instructing, training and educational services. This purpose would never be achieved without taking the students' motivation into consideration. Examining the voice, we can decide the emotional states of the learners after we apply the famous theory of psychologist SDT (Self Determination Theory). This article will investigate certain difficulties and challenges which face e-learner: the problem of leaving their courses and the student's isolation.
Utilizing Gussian blending model (GMM) so as to tackle and to solve the problems of classification, we can determine the learning abnormal status for e-learner. Our framework is going to increase the students’ moti

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF