Preferred Language
Articles
/
bsj-7428
Quantum Theory of Atom in Molecules Investigation Trinuclear Ruthenium: DFT Approach
...Show More Authors

The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Global Pharma Technology
Molecular Investigation of Curli Fimbriae Genes in Enterobacter cloacae Isolated from Various Clinical Sources in Baghdad, Iraq
...Show More Authors

Thirteen isolates were collected from various clinical sources during the periodfrom 22/10/2017 to 22/12/2017. All the isolates were diagnosed based on the microscopic and biochemical propertiesby Vitek-2 Compact system. All isolates formed biofilm 100%, with 30% of isolatesbiofilm produced strongly and 70% on medium. The results of the present study have shown the presence of Curli fimbriae genes in E. cloacae bacteria from cases of urinary tract infections, infected patient with blood bacteremia and inflammation of wounds. Curli fimbriae is considered to be an important factor in the virulence of E.cloacae bacteria, which plays an important role in adhering and combining cells on solid surfaces to form the biofilmand helps in the adhesion

... Show More
Scopus (1)
Scopus
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
Generalization of Rough Set Theory Using a Finite Number of a Finite d. g.'s
...Show More Authors

This paper is concerned with introducing and studying the new approximation operators based on a finite family of d. g. 'swhich are the core concept in this paper. In addition, we study generalization of some Pawlak's concepts and we offer generalize the definition of accuracy measure of approximations by using a finite family of d. g. 's.

View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Analysis of computer textbooks content for intermediate stage according to the theory of multiple intelligence
...Show More Authors

The purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Journal Of The American Geriatrics Society
A Systems Approach to Identify Factors Influencing Adverse Drug Events in Nursing Homes
...Show More Authors

The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association

... Show More
View Publication
Scopus (25)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Thu Oct 22 2020
Journal Name
2020 4th International Symposium On Multidisciplinary Studies And Innovative Technologies (ismsit)
Artificial Intelligence in Smart Agriculture: Modified Evolutionary Optimization Approach for Plant Disease Identification
...Show More Authors

View Publication
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 27 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Investigation of the Aerial Part of Iraqi Convolvulus arvensis
...Show More Authors

 

Convolvulus arvensis is a species of bindweed that is rhizomatous and is in the morning glory family (Convolvulaceae) native to Europe and Asia. The plant is naturally grown in Iraq. The plant was reported to be used in traditional medicine from as early as 1730s.

The Aerial parts of Convolvulus arvensis were macerated in 80% ethanol for 6 days. The concentrated extract was partitioned with n-hexane, chloroform, ethyl acetate- and n-butanol successively. The n-hexane and ethyl acetate, fractions were examined for the presence of phytochemicals by thin l

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Development, Characterization and Pharmacological Investigation of Umbelliferone Conjugates of NSAIDs
...Show More Authors

The present investigation developed the ester prodrugs of Non-steroidal anti inflammatory drugs (NSAIDs), Mefenamic acid and Flurbiprofen by conjugating with the natural antioxidant, 4-methyl umbelliferone that resulted the formation of Mefenamic acid-umbelliferone ester prodrug and Flurbiprofen-umbelliferone ester prodrug .The principal objective this study is the synthesis of the ester prodrugs of NSAIDs with the enhanced therapeutic activity and minimized side effects. Prodrugs were synthesized by coupling method using N,N- dicyclohexylcarbodiimide/4-dimethylaminopyrimidine, subjected to  physical, chemical characterization, spectral characterization (IR, 1H NMR, 13C NMR and Mass spectra),hydro

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Molecular Structure
Mixed-ligand complexes of ampicillin derived Schiff base ligand and Nicotinamide: Synthesis, physico-chemical studies, DFT calculation, antibacterial study and molecular docking analysis
...Show More Authors

A novel series of mixed-ligand complexes of the type, [ML1(L2)3]Clx [M= Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiff base (HL1) as main ligand, nicotinamide (L2) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR,1H-NMR,13C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiff base ligand, HL1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxygen atoms, whereas the sec

... Show More
View Publication
Scopus (34)
Crossref (25)
Scopus Clarivate Crossref