Preferred Language
Articles
/
bsj-3649
Synthesis of Six and Seven-membered Heterocyclic Molecules Containing an Adamantyl Fragment and an X-ray Crystal Structure of (E)-N-(adamantan-1-yl)-1-(3-nitrophenyl)methanimine
...Show More Authors

       Our work included a synthesis of three new imine derivatives—1,3-thiazinan-4-one, 1,3-oxazinan-6-one and 1,3-oxazepin-4,7-dione—which contained an adamantyl fragment. These were produced via the condensation of the Schiff`s base (E)-N-(adamantan-1-yl)-1-(3-aryl)methanimine with 3-mercaptopropanoic acid; 3-chloropropanoic acid; and maleic, citraconic anhydride, respectively. These new imines were prepared via the condensation of adamantan-1-ylamine and 3-nitro-, 3-bromobenzaldehyde in n-BuOH. We obtained a good yield of products. FTIR, 1H NMR spectroscopy and C.H.N.S analysis were used to diagnostic the products. The molecular structure of (E)-N-(adamantan-1-yl)-1-(3-nitrophenyl)methanimine was confirmed by X-ray crystallography analysis.

 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Written Text in Conceptual Art (An Analytical Study)
...Show More Authors

The tagged research problem (the outputs of the written text in conceptual art) dealt with a comparative analytical study in the concept of conceptual art trends (land art - body art - art - language).

The study consisted of four chapters. The first chapter dealt with the theoretical framework, which was represented in presenting (the research problem), which raised the following question: What is the role of the written text in the transformations of the conceptual arts?

The first chapter included (the importance of research) and (research objectives) seeking to conduct comparative research in the written text within the trends of conceptual art as a moving phenomenon in art, and to reveal the variable written text in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 10 2023
Journal Name
Migration Letters
The Effectiveness of E-Training in Developing the Skills of Designing E-Courses for Teachers of Arabic in the Colleges of Education in Iraq
...Show More Authors

This study aimed to examine the effects of electronic training to improve the skills of designing electronic courses for teachers of Arabic language in the colleges of education in Iraq. The descriptive approach is applied and the sample included 145 teachers of Arabic who were selected randomly from the colleges of education in Iraq. Moreover, the results reflected that e-training is effective in improving the skills related to designing online educational courses for teachers of Arabic in the colleges of education in Iraq. Besides, there was no difference between the mean of the respondents' responses to the total score of the tool on the role of electronic training to develop the skills related to electronic courses designing for teacher

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
حوليات اداب عين شمس
فعل الامر من صيغة N المبني للمجهول في اللغة الاكدية
...Show More Authors

يتناول هذا البحث موضوع (( فعل الامر في صيغة المبني للمجهول في اللغة الاكدية )) وهو يتعلق بقواعد اللغة الاكدية , وقد تضمن هذا البحث مقدمة وشقين : صيغة المبني للمجهول وفعل الامر. اما ما يخص المقدمة فقد شملت تعريف الفعل وانقساماته حسب قوة احرفه , الجذر , المعنى , والفاعل , كما تضمنت المقدمة أيضا الحديث عن الصيغ الفعلية الرئيسة الأربعة التي يتألف الفعل الاكدي منها إضافة الى الصيغ الثانوية التي تتضمنها الصيغ الرئيسة . و

... Show More
Publication Date
Tue Sep 19 2017
Journal Name
International Journal Of Science And Research
Volumetric Change of Concrete Containing Water Absorption Polymer Balls
...Show More Authors

Polymers have the ability to extract water after they have been added to the mortar or concrete mixture. They provide the absorbed water during hydration functioning as internal water source. Absorption polymers can absorb up to hundred times of their own weight of pure water.This research deals with the use of water absorption polymer balls in concrete and study the volumetric change of these mixes and compared the results with reference mix (without polymers). Samples were cured both in air and in water for the mixes to compare results which show that samples in air behave for expansion while sample in water acted for shrinkage.

Publication Date
Mon May 01 2023
Journal Name
Journal Of Pure And Applied Microbiology
The Immunohistochemical Staining of Vimentin and E-Cadherin in Bladder Cancer Patients Infected with Hepatitis C Virus
...Show More Authors

Scopus (23)
Scopus
Publication Date
Thu May 18 2023
Journal Name
J Pure Appl Microbiol.
The Immunohistochemical Staining of Vimentin and E-Cadherin in Bladder Cancer Patients Infected with Hepatitis C Virus
...Show More Authors

The invasion and spread of cancer cells are two of the most notable characteristics of malignant tumors. Recent studies suggest that the epithelial-mesenchymal transition (EMT) has been linked to this significant occurrence. It is linked to the absence of the epithelial brow and the presence of mesenchymal facial hair. The aims of the present study were to explore the immunohistochemical staining of vimentin and E-cadherin ex vivo as EMT markers and assess their potential as predictive biomarkers for transitional cell cancer (TCC). In this study, 55 paraffin-embedded biopsies from TCC patients and 10 autopsies that appeared to be normal were included. Immunohistochemistry was used to produce patterns of vimentin and E-cadherin expression. W

... Show More