Preferred Language
Articles
/
bsj-7708
Ni2+, Pt4+, Pd2+, and Mn2+ Metal ions Complexes with Azo Derived from Quinolin-2-ol and 3-amino-N-(5-methylisoxazol-3-yl) Benzenesulfonamide: Synthesis, Characterization, Thermal Study ,and Antioxidant Activity
...Show More Authors

 

Diazotization reaction between quinolin-2-ol and (2-chloro-1-(4-(N-(5-methylisoxazol-3-yl)sulfamoyl)phenyl)-2l4-diazyn-1-ium was carried out resulting in ligand-HL, this in turn reacted with the next metal ions (Ni2+, Pt4+, Pd2+, and Mn2+)  forming stable complexes with unique geometries such as (tetrahedral for both Ni2+ and Mn2+, octahedral for Pt4+ and square planer for Pd2+ ). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and the coordination with metal ion through it. Pyrolysis (TGA & DSC) studies proved the coordination of water residues with metal ions inside the coordination sphere as well as chlorine atoms. Moreover, element micro-analysis and AAS that gave corresponding outcome with theoretically counting outcome.  (1H &13C-NMR) and magnetic quantifications can also indicate the formation of ligand-HL and occurrence of coordination. Antioxidant activities of these compounds were evaluated against (DPPH) radical and were compared to the standard natural antioxidant, ascorbic acid. The findings showed that these compounds exhibit excellent radical scavenging activities

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Microbiological Examination of some ImportedCanned and Frozen Foods
...Show More Authors

A number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Blindness And Sight In Ralph Ellison's Invisible Man
...Show More Authors

The Civil Rights era has been an era of struggle for the African American in the
Unites states. Thus, many writers devoted their writing to reflect the racism and
discrimination that many have suffered from, among them is Ralph Ellison.
Ralph Ellison is a 20th century African-American writer and scholar best known for
his renowned, award-winning novel Invisible Man. He illustrates the powerful
social and political forces that conspire to keep black Americans in their place,
denying them the right to life, liberty, and the pursuit of happiness guaranteed to all
Americans. Invisible Man is a 1952 novel that addresses many of the social and intellectual
issues facing African-Americans in the twentieth century. It exa

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Informatics (iceei)
Health Information Exchange: Current Trends, Challenges and Recommendations
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
knowledge sharing and its role in Organizational excellence
...Show More Authors

The current research aims to diagnose the extent of interest in knowledge sharing and its role in achieving organizational excellence at the level of the Iraqi environment Primary data through descriptive statistics (arithmetic mean, standard deviation, coefficient of variation, percentages, frequencies) and hypothesis testing using appropriate statistical methods for inferential statistical analysis (Pearson correlation coefficient, simple linear regression, multiple regression, path analysis) and checking the quality of the data from During (normal distribution, confirmatory factor analysis, structural modeling method, and exploratory factor analysis), after collecting data from (358) observations from the company’s leaders, as

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 14 2024
Journal Name
International Journal Of Disabilities Sports & Health Sciences
How precision, strength and flexibility affect badminton skills
...Show More Authors

The importance of the research lies in developing flexibility exercises (positive and negative) that help improve the level of physical and skill performance, address some weak points, and develop factors that work to implement skills with a wider range of motion, accuracy, and high strength. This is what makes the game of badminton more developed and successful. Performing (dimensions) strokes And the forward projection) by not using the wrist and the correct movement of the striking arm. This makes the player’s performance ineffective, which requires her to practice flexibility and movement flow to address this weakness. The study aims to prepare exercises using flexibility (positive and negative) and to know the e

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Association between periodontitis and acquired coronary heart disease
...Show More Authors

Background: The association between oral microbial infection and systemic disease is not a new concept. A major confounding issue is that oral infections often are only one of the many important factors that can influence systemic diseases .Objective: This study was conducted to evaluate the periodontal health status of patients with acquired coronary heart disease. Type of the study: Cross-sectional study.Methods: The study group consisted of 200 patients with an age range (35-70) years, having coronary heart disease .This study group were compared to a control group of non-coronary heart disease (200 individuals ) matching with age and gender. The oral parameters were examined including the periodontal conditions, assessment of periodo

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Relationship between Diabetes mellitus and Urinary tract infections
...Show More Authors

Blood and urine samples were collected from 203 patients to study the relationship between Diabetes mellitus and urinary tract infections (UTI). Blood and urine specimens were subjected for estimation of random blood sugar, in addition to detection of the most pathogen bacteria which cause urinary tract infection in diabetic patients. The study included the detection of bacterial sensitivity to some antibiotics used in treating urinary tract infections, and also included the study of genetic basis which cause both types of diabetes mellitus. The results can be summarized as follows: The incidence of type ? diabetes in males was (35.8%), and (45.9%) in females . and type 2 diabetes in males was (49.6%), while in females was (40.16%).The inc

... Show More
View Publication Preview PDF
Crossref