Preferred Language
Articles
/
bsj-5193
A complete (48, 4)-arc in the Projective Plane Over the Field of Order Seventeen
...Show More Authors

            The article describes a certain computation method of -arcs to construct the number of distinct -arcs in  for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each construction especially for large value of  and then reduce the running time of the calculation. Therefore, it allows to decrease the memory storage for the calculation processes. This method’s effectiveness evaluation is confirmed by the results of the calculation where a largest size of complete -arc is constructed.  This research’s calculation results develop the strategy of the computational approaches to investigate big sizes of arcs in  where it put more attention to the study of the number of the inequivalent classes of -secants of -arcs in  which is an interesting aspect. Consequently, it can be used to establish a large value of .

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 02 2022
Journal Name
Al-manhaj
Mathematical Statistics - Second Edition
...Show More Authors

This Book is the second edition that intended to be textbook studied for undergraduate/ postgraduate course in mathematical statistics. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces events and probability review. Chapter Two devotes to random variables in their two types: discrete and continuous with definitions of probability mass function, probability density function and cumulative distribution function as well. Chapter Three discusses mathematical expectation with its special types such as: moments, moment generating function and other related topics. Chapter Four deals with some special discrete distributions: (Discrete Uniform, Bernoulli, Binomial, Poisson, Geometric, Neg

... Show More
Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Chemistry And Materials Research
Synthesis, Physico-Chemical and Antimicrobial Activities Co(II),Ni (II) ,Cu(II), Zn(II),Cd(II) and Hg(II) Mixed- Ligand Complexes of L- Alanine and Trimethoprim Antibiotic
...Show More Authors

The Co (II), Ni (II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Alanine ) and Trimethoprim antibiotic were synthesized. The complexes were characterized using melting point, conductivity measurement and determination the percentage of the metal in the complexes by flame (AAS). Magnetic susceptibility, Spectroscopic Method [FTIR and UV-Vis]. The general formula have been given for the prepared mixed ligand complexes [M(Ala)2(TMP)(H2O)] where L- alanine (abbreviated as (Ala ) = (C5H9NO2) deprotonated primary ligand, L- Alanine ion .= (C5H8NO2 -) Trimethoprim (abbreviated as (TMP ) = C10H11N3O3S M(II) = Co (II),Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II). The results showed that the deprotonated L- Alanine by KOH (Ala

... Show More
Preview PDF
Publication Date
Mon Apr 10 2017
Journal Name
Al-mustansiriyah Journal Of Science
Synthesis, characterization and antibacterial Evaluation for mixed-ligand Complexes of Nickle (II), Manganese(II), Copper( II),Cobalt(II) and Mercury(II) with Tetradentate Schiff base and 1,10-phenanthroline
...Show More Authors

An abstract is a brief summary of a research article, thesis, Schiff base ligand (L) was prepared by the reaction of 4-aminantipyrine with o-phenylenediamine, the prepared ligand characterized by Micro elemental Analysis, FT. IR, UV-Vis, and 1H,13C-NMR spectroscopy.complexes of Mn(II), Co(II), Ni(II), Cu(II) and Hg(II) with Schiff base and 1,10-phenanthroline (Phen) have been investigated in aqueous ethanol with (1:1:1) (M:L:Phen). The prepared complexes were characterized using flame atomic absorption, (C. H. N) Analysis, FT. IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. From the obtained data the octahedral structure was suggested for all complexes. The biological screening effects o

... Show More
Publication Date
Mon Aug 17 2020
Journal Name
Systematic Reviews In Pharmacy
New mixed ligand complexes of New Schiff base 4,4'- ((naphthalen-1-ylimino) methylene) dibenzene-1,3-diol and 8-hydroxy quinoline: Synthesis, Spectral Characterization, Thermal studies and Biological Activities
...Show More Authors

New mixed ligand complexes of New Schiff base 4,4'- ((naphthalen-1-ylimino) methylene) dibenzene-1,3-diol and 8-hydroxy quinoline: Synthesis, Spectral Characterization, Thermal studies and Biological Activities

Publication Date
Tue Jan 01 2013
Journal Name
Advances In Physics Theories And Applications
Adsorption Study of Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1,2-diylidenebis(methan-1-yl-1-ylidene) bis (2-methoxyphenol)] on Granulated Initiated Calcined Iraqi Montmorillonite via Columnar Method.
...Show More Authors

The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol

... Show More
Preview PDF
Publication Date
Mon Jul 29 2024
Journal Name
Reviews In Inorganic Chemistry
Antituberculosis, antimicrobial, antioxidant, cytotoxicity and anti-inflammatory activity of Schiff base derived from 2,3-diaminophenazine moiety and its metal(II) complexes: structural elucidation, computational aspects, and biological evaluation
...Show More Authors
Abstract<p>Enticed by the present scenario of infectious diseases, four new Co(II), Ni(II), Cu(II), and Cd(II) complexes of Schiff base ligand were synthesized from 6,6′-((1E-1′E)(phenazine-2,3-dielbis(azanylidene)-bis-(methanylidene)-bis-(3-(diethylamino)phenol)) (<bold>H</bold> <sub> <bold>2</bold> </sub> <bold>L</bold>) to ascertain as effective drug for antituberculosis, anti-inflammatory, antioxidant, cytotoxic and antimicrobial activities. The organic ligand and its metal(II) complexes were characterized by numerous physical and spectroscopic methods, which showed that the</p> ... Show More
View Publication
Scopus (8)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Rsc Advances
Green biosynthesis of selenium nanoparticles by <i>Ralstonia insidiosa</i> which demonstrate effectiveness against human cancer cells, <i>Candida</i> species and multidrug-resistant <i>Acinetobacter baumannii</i>
...Show More Authors

Green biosynthesized selenium nanoparticles from Ralstonia insidiosa show potent activity against multidrug-resistant Acinetobacter baumannii , pathogenic Candida spp. and human prostate cancer cells.

View Publication
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref