Preferred Language
Articles
/
cRe7QJABVTCNdQwC1oW0
Synthesis of Some New Amides Containing Heterocyclic Units Based on Hydrazide Derivatives

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Nov 08 2015
Journal Name
مجلة كلية التربية الاساسية القاجسية
Synthesis, Characterization, and Antibacterial Properties of mixed ligand Complexes of (L-Leucine and 8-hydroxyquinoline) with some metals Ions

Publication Date
Sun Jan 01 2012
Journal Name
Chemistry And Materials Research
Synthesis ,characterization and antibacterial activity of mixed ligand complexes of some metals with 1-nitroso-2-naphthol and Lphenylalanine

Preview PDF
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Synthesis and Spectral Analysis of Some Metal Ions Complexes with Mixed Ligands of Schiff Base and 1, 10-Phenanthroline

The free Schiff base ligand (HL1) is prepared by being mixed with the co-ligand 1, 10-phenanthroline (L2). The product then is reacted with metal ions: (Cr+3, Fe+3, Co+2, Ni+2, Cu+2 and Cd+2) to get new metal ion complexes. The ligand is prepared and its metal ion complexes are characterized by physic-chemical spectroscopic techniques such as: FT-IR, UV-Vis, spectra, mass spectrometer, molar conductivity, magnetic moment, metal content, chloride content and microanalysis (C.H.N) techniques. The results show the formation of the free Schiff base ligand (HL1). The fragments of the prepared free Schiff base ligand are identified by the mass spectrometer technique. All the analysis of ligand and its metal complexes are in good agreement with th

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Oct 04 2022
Journal Name
Ieee Access
Plain, Edge, and Texture Detection Based on Orthogonal Moment

Image pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
Scopus (7)
Crossref (5)
Scopus Crossref
View Publication
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Review on Vision Based Real Time Fingertip Detection Approaches

    Computer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection

Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model

Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF