Preferred Language
Articles
/
bsj-9095
Synthesis of Multifunctional Polymers Based on Tert-Butyl Acrylamide/Octyl Acrylate as Lubricant Additives and Adsorbents for Copper Ion from Aqueous Solution
...Show More Authors

Two homopolymeric and three copolymeric additives for base oil were synthesized using octyl acrylate (OA) and tert-butyl acrylamide (TBA) monomers. The two additives named P1 and P2 are the homopolymers of TBA and OA, respectively, whereas copolymeric additives named Co1, Co2, and Co3 were synthesized by varying the ratios of TBA:OA as 1:3, 3:1 and 1:1, respectively. The prepared polymers were characterized by Fourier Transform Infrared (FTIR). Based on the solubility of synthesized polymers in base oil and reactivity ratios of TBA/OA copolymer (0.222, 0.434) calculated by Fineman-Ross method, P2, Co1, Co2 and Co3 were selected to evaluate their performance as pour point depressant (PPD), viscosity improver (VII), and anticorrosion additives in base oil. Additives P2 and Co1 showed the best performance as (PPD) and (VII) whereas Co2 and Co3 revealed the best performance as anticorrosion additives. The flash point of base oil increased as a concentration of polymeric additives increased in the base oil. In addition to study the performance of synthesized polymers as lubricant additives, the capability of polymers for removing CuII from synthetic wastewater was also investigated. Different parameters such as pH of solution, contact time, and CuII concentration were changed in order to study their effect on adsorption capacity of polymers. Generally, polymers with high TBA content such as P1, Co2, and Co3 showed good performance in removing CuII.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of some new heterocyclic derivatives from aromatic carbonyl ‎compounds and carboxylic acids with Evaluation some of them for biological activity
...Show More Authors

     In this research investigation, a total of eighteen diverse tetra- and penta-lateral cyclic compounds were synthesized. These included 1,3,4-thiadiazole, thiazolidin-4-one (via an alternative method), 1,2,4-triazole, carbothioamide, thiazole-4-one, azetidin-2-one, and oxazole. The synthesis procedure entailed a sequence of reactions. The thiazolidine-4-one 1 was obtained by reaction p-aminobenzoic acid with thiosemicarbazide, followed by treatment with p-tolualdehyde to produce Schiff base 2. Reaction Schiff base 2 with mercaptoacetic acid in dry benzene was carried out to produce thiazolidine-4-one 3. In another synthesis pathway, the esterification of p-nitro benzoic acid with ethanol in the presence of sulfuric acid was

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Mar 02 2020
Journal Name
Journal Of Applied Research In Higher Education
Proposal of a guide for talent evaluation and management based on a qualitative and three-staged approach
...Show More Authors
Purpose

The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.

Design/methodology/approach

The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty-three individuals from six Australian universities parti

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS, CHARACTERIZATION, AND STUDY THE BIOLOGICAL ACTIVITY OF SOME SCHIFF'S BASES, AND 1,3 - OXAZEPINE COMPOUNDS DERIVED FROM SULFAMETHOXAZOLE DRUG: SYNTHESIS, CHARACTERIZATION, AND STUDY THE BIOLOGICAL ACTIVITY OF SOME SCHIFF'S BASES, AND 1,3 - OXAZEPINE COMPOUNDS DERIVED FROM SULFAMETHOXAZOLE DRUG
...Show More Authors

This study including synthesis of some new Schiff bases compounds [16] from the reaction of Sulfamethoxazole drug with some aromatic aldehydes in classical Schiff base method then treatment Schiff  bases with succinic anhydride to get oxazepines rings [7-11]These derivatives were characterized by melting point, FTIR, 1H NMR and mass spectra. Some of synthesized compounds were evaluated in vitro for their antibacterial activities against three kinds of pathogenic strains Staphylococcus aureus, Escherichia coli

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The role of the woman in protecting children from wrong behavioral deviations
...Show More Authors

Wrong behavioral deviations among youth witnessed an obvious growing, some of these deviations are, robbery, drug and internet addiction, and smoking. Additionally, intellectual extremism and the disrespect of the traditions and genuine customs, In light of this issue, the research aims to shed light on the educational and preventative role of the woman in protecting and immunizing children from the wrong behavioral deviations. The woman has a significant and influential role in the society in general and in her family, in particular to the responsibility lies on her. The research shed light on the manifestations of behavioral deviation in children and the mechanisms of prevention and treatment. The research concluded with a set of recom

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (2)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Robotic System for Tracking Moving Objects Based On Their Color
...Show More Authors

Tracking moving objects is one of a very important applications within the computer vision. The goal of object tracking is segmenting a region of interest from a video scene and keeping track of its motion and positioning. Track moving objects used in many applications such as video surveillance, robot vision, and traffic monitoring, and animation. In this paper a four-wheeled robotic system have been designed and implemented by using Arduino-Uno microcontroller. Also a useful algorithms have been developed to detect and track objects in real time. The main proposed algorithm based on the kernel based color algorithm and some geometric properties to tracking color object. Robotic system is a compromise of two principal parts which are th

... Show More
View Publication Preview PDF