Preferred Language
Articles
/
bsj-6704
Synthesis, Spectral Identification, Antibacterial Evaluationand Theoretical Study of Co, Fe, Rh and Pd Complexes for 2-benzoylthiobenzimidazol
...Show More Authors

A new novel series of metalcomplexes are prepared from reactions between 2-benzoylthio- benzimidazole (L) with metal salts of Co (II) , Fe(III) and Rh (III) , while Pd(II) complex was obtained by mixing ligandsof 2-benzoylthiobenzimidazole (L) as primary ligand and bipyridine (L/)as secondary ligand as well as palladium chloride as metal salt in an ethanoic medium. The geometry of these compounds were identified using C.H.N.microanalysis, Ultraviolet–visible, Fourier transforms infrared, magnetic susceptibility, molar conductivity and flame atomic absorption (A.A). From the dataobtained by these spectral analyses, the molecular structures for Rh and Fe complexes were proposed to be octahedral geometry. A square planar construction is proposed for Pd(II), while a Tetrahedral Geometry for Cobalt (II)complex. All of the complexes which were prepared displayedobviousconstancy and could be stored for months without showing any considerablealteration. Semi-empirical methods (ZINDO/1, ZINDO/S & PM3) were conducted to assess the heat of formation ∆H˚f, binding energy ∆Eb, and dipole moment for all compounds as theoretic study. The complexes expressnotable biological activities to pathogenic bacteria when inspected on certain bacteria. The synthesized compounds exhibited moderate toverygood antibacterial activity against bacterial strains, i.e., Escherichiacoli, Staphylococcus aureus & Pseudomonas aeruginosa.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Automatic Block Selection for Synthesizing Texture Images using Genetic Algorithms
...Show More Authors

Texture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref
Publication Date
Thu May 01 2008
Journal Name
2008 International Conference On Computer And Communication Engineering
A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Mixed Linearity Improvement Techniques for Ultra-wideband Low Noise Amplifier
...Show More Authors

<span>We present the linearization of an ultra-wideband low noise amplifier (UWB-LNA) operating from 2GHz to 11GHz through combining two linearization methods. The used linearization techniques are the combination of post-distortion cancellation and derivative-superposition linearization methods. The linearized UWB-LNA shows an improved linearity (IIP3) of +12dBm, a minimum noise figure (NF<sub>min.</sub>) of 3.6dB, input and output insertion losses (S<sub>11</sub> and S<sub>22</sub>)  below -9dB over the entire working bandwidth, midband gain of 6dB at 5.8GHz, and overall circuit power consumption of 24mW supplied from a 1.5V voltage source. Both UWB-LNA and linearized UWB-LNA designs are

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials &amp; Continua
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
...Show More Authors

View Publication
Scopus (16)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Results In Physics
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
New Commands to Improve the Monitor for the ELWE Microcomputer
...Show More Authors

The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More