Preferred Language
Articles
/
bsj-9095
Synthesis of Multifunctional Polymers Based on Tert-Butyl Acrylamide/Octyl Acrylate as Lubricant Additives and Adsorbents for Copper Ion from Aqueous Solution
...Show More Authors

Two homopolymeric and three copolymeric additives for base oil were synthesized using octyl acrylate (OA) and tert-butyl acrylamide (TBA) monomers. The two additives named P1 and P2 are the homopolymers of TBA and OA, respectively, whereas copolymeric additives named Co1, Co2, and Co3 were synthesized by varying the ratios of TBA:OA as 1:3, 3:1 and 1:1, respectively. The prepared polymers were characterized by Fourier Transform Infrared (FTIR). Based on the solubility of synthesized polymers in base oil and reactivity ratios of TBA/OA copolymer (0.222, 0.434) calculated by Fineman-Ross method, P2, Co1, Co2 and Co3 were selected to evaluate their performance as pour point depressant (PPD), viscosity improver (VII), and anticorrosion additives in base oil. Additives P2 and Co1 showed the best performance as (PPD) and (VII) whereas Co2 and Co3 revealed the best performance as anticorrosion additives. The flash point of base oil increased as a concentration of polymeric additives increased in the base oil. In addition to study the performance of synthesized polymers as lubricant additives, the capability of polymers for removing CuII from synthetic wastewater was also investigated. Different parameters such as pH of solution, contact time, and CuII concentration were changed in order to study their effect on adsorption capacity of polymers. Generally, polymers with high TBA content such as P1, Co2, and Co3 showed good performance in removing CuII.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis and Preliminary Pharmacological Evaluation of Esters and Amides Derivatives of Naproxen as Potential Anti-Inflammatory Agents
...Show More Authors

4-chloro and 4- nitro substituted phenol and aniline incorporated to a carboxylic group of naproxen a well-known non-steroidal anti-inflammatory drug (NSAID) to increase bulkiness were synthesized for evaluation as  a potential anti-inflammatory agents with expected COX-2 selectivity. In vivo acute anti-inflammatory activity of these compounds (I-IV) was evaluated in rats using egg-white induced edema model of inflammation in a dose equivalent to (2.5 mg/Kg) of naproxen. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, compounds I and IV might show higher effect comparable to that of naproxen and to that of compounds II & III whic

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 03 2016
Journal Name
Technology Reports Of Kansai University
Some statistical results for solution type of the Inequalities system
...Show More Authors

Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Heralds of victory and empowerment of Islam From the texts and reality that the Noble Prophet (s) prophesied about
...Show More Authors

Idea of ​​research

The global vision for the future of mankind and societies to achieve supremacy, empowerment and victory is limited to the sincerity of the sincere Islamic vision and its evidence, and this true vision is presented through the texts of the Noble Qur’an, the Sunnah of the Prophet and the concrete reality to achieve victory and empowerment of Islam, and does not respond by tracking the movement of history and its interventions.

The Islamic nation is a nation of survival and continuity with God’s promise and it needs to wake up and alert, and leadership that takes its hand into the path of victory and empowerment, and that this promise fulfills conditions of the most important of these is a promis

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis of New Cyclic Amines-Linked Metronidazole Derivatives as Possible Prodrugs
...Show More Authors

         Certain cyclic amine derivatives of metronidazole via acetate spacer were prepared. Cyclic amines used are piperidine and piperazine to improve the physicochemical properties and reduce some of metronidazole side effects. This is believed to be done by modification of its structural features to get prodrugs with improved properties over that of metronidazole. The present work includes esterification of metronidazole with choroacetic acid, N-alkylation of the cyclic amines by the halogenated ester and characterization of their structures by spectral(UV and IR) and elemental(CHN)analysis.The melting points, degree of solubilities and partition coefficients were also determined. Both metronid

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Antibacterial Inhibitor as an Expired Metoclopramide in 0.5M Phosphoric Acid
...Show More Authors

Expired drug Metoclopramide was investigated as an antibacterial corrosion inhibitor for carbon steel in 0.5M H3PO4 solution using the electrochemical method at 30oC and 60oC. The results showed that this drug is an efficient inhibitor for carbon steel and the efficiency reached to 82.244 % for 175 ppm at 30oC and 76.146% for 225 ppm at 60oC. The adsorption of drug on carbon steel surface follows Langmuir adsorption isotherm with small values of adsorption-desorption constant. The polarization plots revealed that Metoclopramide acts as mixed-type inhibitor. Some parameters of inhibition process were calculated and discussed. The surface morphology of the carbon steel speci

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
protect the environment from destruction in light of the verses of the Quran (Subjective Study)
...Show More Authors

Environment suffered in recent years a large corrupting by human; and because of his ignorance of the dimensions of Caliphate in the ground and ignore what it means gearing. The gearing is that the son of Adam, which will benefit the board of Allah Almighty to him in the land of the causes of life, without exaggeration or negligence and without prejudice to the cosmic Balnoames enacted by the Almighty Creator, has urged verses of the Quran Muslim to preserve and protect the environment which is a religious duty, as it showed a great verses he is the author and the splendor and beauty of workmanship and manufacturer greatness of the Almighty, who created all things beautiful.
Koran played a major role in the consolidation of environmen

... Show More
View Publication Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref