Preferred Language
Articles
/
bsj-820
Interactions of some metal ions with Nitrogenous bases present in Nucleotides
...Show More Authors

Acidity constants at 30co and 0.125 ionic strength have been determined for the Nitrogous bases of nucleic acid; cytocine, uarcil and thymine, and found to be 3.55 x10-19 , 1.44 x10 -19 and 7.24 x10 -20 respectively. Stability constants of these bases with Thorium and uranyl ions have been determined. Results showed that metal ions Thorium and uranyl ions behave as hard acids and the nitrogenum bases behave as Hard bases according to Pearson's definition .Hardness – softness parameters for these ligands were calculated ,stability constants of complexes with metal ions could be arranged as follows :- Cytosine > Uracil > Thymine .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Publication Date
Thu Sep 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Trimethoprim derivative Schiff bases are versatile ligands synthesized with carbonyl groups from the condensation of primary amines (amino acids). Because of their broad range of biological activity, these compounds are very important in the medical and pharmaceutical fields. Biological activities such as antibacterial, antifungal and antitumor activity are often seen. Transition metal complexes derived from biological activity Schiff base ligands have been commonly used

Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY OF SOME IMMUNOLOGICAL PARAMETERS IN PATIENT THAT INFUCTED WITH Streptococcus pyogenes: STUDY OF SOME IMMUNOLOGICAL PARAMETERS IN PATIENT THAT INFUCTED WITH Streptococcus pyogenes
...Show More Authors

A streptococci has recognized as Streptococcus spp., associate with acute pharyngitis. S. pyogenes infection Has detected in the Hospital and Health Center in Tikrit city. Throat swabs sample has obtained and cultured on a sheep blood agar plate. Identification of S. pyogenes was performed by using the VITEK 2 automatic system. It detected of 50 samples from children included 25 were positive for S. pyogenes infection. were aged 10-35 years old and included 30 male and 20 female. . While 25 sample Negative of S. pyogenes infection (The control group included 25 clinically healthy children without S. pyogenes infection matched for age and sex with cases pateints). No significa

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
Defense Diplomacy: The role of the French military bases in the African continent
...Show More Authors

This research seeks to study the role of military bases in activating defense diplomacy, with a focus on studying the case of France in the African continent, which relied on its military bases as a tool to implement its foreign policy. The research explains the concept of defense diplomacy and its relationship to military bases as an effective tool to strengthening bilateral relations between the state's parties. The research focuses on studying the effectiveness of military bases as a tool for activating French defense diplomacy, and studying the goals that French foreign policy seeks to achieve through its intervention or presence in the African continent. In addition to the geopolitical reasons that prompted France to move to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Synthesis And Characterization Of Some New Metal Complexes Of Ethyl Cyano (2-Methyl Carboxylate Phenyl Azo Acetate)
...Show More Authors

Complexes of (Co2+, Ni2+, Cu2+, Zn2+, Cd2+ and Hg2+) with the ligand Ethyl cyano (2-methyl carboxylate phenyl azo acetate) (ECA) have been prepared and characterized by FTIR, (UV-Visible), Atomic absorption spectroscopy, Molar conductivity measurements and magnetic moments measurements. The following general formula has been suggested for the prepared complexes [M(ECA)2]Cl2 where M = (Co2+, Ni2+, Cu2+ ,Zn2+, Cd2+, Hg2+) and the geometry is octahedral.

Publication Date
Fri Feb 13 2026
Journal Name
Al-qadisiyah Journal Of Pure Science
Synthesis and Spectral Studies of Heterocyclic Azo Dye Complexes with Y(III) and La(III)Ions.
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Ecological Engineering
Chromium Ions Removal by Capacitive Deionization Process – Optimization of the Operating Parameters with Response Surface Methodology
...Show More Authors

An innovative desalination method called electrosorption or capacitive deionization (CDI) has significant benefits for wastewater treatment. This process is performed by using a carbon fiber electrode as a working electrode to remove hexavalent chromium ions from an aqueous solution. The pH, NaCl concentration, and cell voltage were optimized using the Box-Behnken experimental design (BDD) in response surface methodology (RSM) to study the effects and interactions of selected variables. To attain the relationship between the process variables and chromium removal, the experimental data were subjected to an analysis of variance and fitted with a quadratic model. The optimum conditions to remove Cr(VI) ions were: pH of 2, a cell voltage of 4.

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Numerical study of natural convection in an annulus between two concentric cylinders provided with metal foam fins
...Show More Authors

Natural convection in an annular space provided with metal foam fins attached to the inner cylinder is studied numerically. The metal foam fins made of copper were inserted in different axial sections with three fins in each section. The temperature of the inner cylinder is kept constant while the annular outer surface is adiabatic. The thickness effect of the inner pipe wall was considered. Naiver Stokes equation with Boussinesq approximation is used for the fluid regime while Brinkman-Forchheimer Darcy model is used for metal foam. In addition, the local thermal non-equilibrium condition in the energy equation of the porous media is presumed. The effect of Rayleigh numb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Application of Groebner Bases to Study a Communication System
...Show More Authors

This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.

View Publication Preview PDF
Scopus Clarivate Crossref