Preferred Language
Articles
/
bsj-898
Ligand reduction in variously substituted cerium (IV) tetrakis acetylacetone complexes by electrochemistry technique
...Show More Authors

In this work, substantial evidence was obtained for ligand reduction in cerium tetrakis acac complexes. Also, this ligand reduction of a negatively charged ligand proved to depend far less on the nature central metal than neutral ligands does. It is supposed that in Mz(acac)z complexes the charge is distributed evenly over the whole molecule. In this work these complexes were prepared and characterized by IR and CHN analysis to indicate the purities of these complexes. The electrochemistry techniques were shown as obtained for ligand reduction. This research was carried out at School of Chemistry and Molecular Science, Sussex University, U.K.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
Enhancing LSB algorithm against brute-force attack using ASCII mapping technique
...Show More Authors

Publication Date
Thu Jul 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A proposed encryption technique of different texts using circular link lists
...Show More Authors

View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Construction of Graduation Certificate Issuing System Based on Digital Signature Technique
...Show More Authors

With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 25 2012
Journal Name
The Nineteenth Scientific Conference The College Of Education \al-mustansiriyah University
Solution of Ordinary BVP's of Eighth Order Using Osculatory Interpolation Technique
...Show More Authors

The aim of this paper is to present method for solving ordinary differential equations of eighth order with two point boundary conditions. We propose two-point osculatory interpolation to construct polynomial solution.

View Publication
Publication Date
Mon Dec 30 2024
Journal Name
Journal Of The College Of Education For Women
The Effect of Dictogloss Technique on University EFL Students' Collocation Knowledge
...Show More Authors

تتمثل مشكلة الدراسة في الصعوبات التي يواجهها طلاب اللغة الإنجليزية كلغة أجنبية في تعلم وإتقان المتلازمات اللفظية. تهدف هذا الدراسة تهدف إلى تحديد أثر استخدام تقنية المسرد الاملائي على معرفة المتلازمات اللفظية لدى الطلاب. ولتحقيق أهداف هذا البحث والتحقق من فرضياته تم اختيار عينة عشوائية مكونة من (60) طالبة من كلية اللغة الإنجليزية للسنة الثانية باستخدام كتاب الفهم القرائي المقرر للمستوى الثاني في قسم الل

... Show More
View Publication
Crossref
Publication Date
Sat Oct 03 2009
Journal Name
Proceeding Of 3rd Scientific Conference Of The College Of Science
Research Address: New Multispectral Image Classification Methods Based on Scatterplot Technique
...Show More Authors

Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Improvement of the technique for the solution method of Gauss Seidel
...Show More Authors

In this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun May 12 2019
Journal Name
Oral And Maxillofacial Surgery
Lingual anesthesia of the lower anterior teeth, which technique is better?
...Show More Authors

Purpose To extract the lower anterior teeth, the oral surgeon needs to anesthetize the pulpal tissue of the accused tooth and the surrounding tissues. The lingual nerve innervates the lingual soft tissue to the lower teeth, this nerve usually anesthetized alongside the inferior alveolar nerve by a block technique. However, the lingual tissue of the lower anterior teeth usually anesthetized by either infiltration or periodontal ligament injection (PDL) techniques. This study was intended to compare between these two techniques. Methods Forty-eight teeth were extracted from 24 patients. Non-adjacent two lower anterior teeth in the same patient were selected. The lingual soft tissue in one of them was anesthetized by PDL injection technique wh

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Apr 29 2021
Journal Name
Egyptian Journal Of Chemistry
Fabrication and Study of ZnO thin Films using Thermal Evaporation Technique
...Show More Authors

Pure SnSe thin film and doped with S at different percentage (0,3,5,7)% were deposited from alloy by thermal evaporation technique on glass substrate at room temperature with 400±20nm thickness .The influences of S dopant ratio on characterization of SnSe thin film Nano crystalline was investigated by using Atomic force microscopy(AFM), X-ray diffraction (XRD), energy dispersive spectroscopy (EDS), Hall Effect measurement, UV-Vis absorption spectroscopy to study morphological, structural, electrical and optical properties respectively .The XRD showed that all the films have polycrystalline in nature with orthorhombic structure, with preferred orientation along (111)plane .These films was manufactured of very fine crystalline size in the ra

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref