Preferred Language
Articles
/
cRe7QJABVTCNdQwC1oW0
Synthesis of Some New Amides Containing Heterocyclic Units Based on Hydrazide Derivatives
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis, characterization and bioactivity study of mixed-lig and complexes with some metal ions for new dithiocarbamate,3-aminophenol
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al-qadisiyah Journal Of Pure Science
Synthesis and Spectroscopic Studies of new ligand N-((4-(phenylamino)phenyl)carbamothioyl)acetamide with some Divalent Metal Ion Complexes
...Show More Authors

A new ligand N-((4-(phenylamino) phenyl) carbamothioyl) acetamide (PCA) was synthesized by reaction of (4-amino di phenyl amine) with (acetyl isothiocyante) by using acetone as a solvent. The prepared ligand(PCA) has been characterization by elemental analysis (CHNS), infrared(FT-IR),electronic spectral (UV-Vis)&1H,13C- NMR spectra. Some Divalent Metal ion complexes of ligand (PCA) were prepared and spectroscopic studies by infrared(FT-IR), electronic spectral (UV-Vis), molar conductance, magnetic susceptibility and atomic absorption. The results measured showed the formula ofFall prepared complexes were [M (PCA)2 Cl2] (M+2 = Mn, Co, Ni, CU, Zn, Cd &Hg),the proposed geometrical structure for all complexes wereeoctahedral.

Publication Date
Mon Aug 05 2024
Journal Name
Food And Bioprocess Technology
Development of an Innovative Reinforced Food Packaging Film Based on Corn Starch/Hydroxypropyl Methylcellulose/Nanocrystalline Cellulose Incorporated with Nanogel Containing Quercetin
...Show More Authors

View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Some Properties of Carbon Fiber Reinforced Magnetic Reactive Powder Concrete Containing Nano Silica
...Show More Authors

         This study involves the design of 24 mixtures of fiber reinforced magnetic reactive powder concrete containing nano silica. Tap water was used for 12 of these mixtures, while magnetic water was used for the others. The nano silica (NS) with ratios (1, 1.5, 2, 2.5 and 3) % by weight of cement, were used for all the mixtures. The results have shown that the mixture containing 2.5% NS gives the highest compressive strength at age 7 days. Many different other tests were carried out, the results have shown that the carbon fiber reinforced magnetic reactive powder concrete containing 2.5% NS (CFRMRPCCNS) had higher compressive strength, modulus of rupture, splitting tension, str

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Systematic Reviews In Pharmacy
Synthesis And Preliminary Antimicrobial Evaluation Of Schiff Bases Of N -Benzyl Isatin Derivatives
...Show More Authors

Isatin (1H-indole-2, 3-dione) and its analogs are an important class of heterocyclic compounds. N-benzyl isatins and Schiff bases of isatin analogs have been reported to demonstrate a variety of biological activities. This work illustrates the synthesis of new N-benzylisatin Schiff bases and studies their biological activity. Firstly, Isatin and its analogs; 5-methoxyisatin, 5-fluoroisatin reacted with benzyl iodide to obtain N-benzylated derivatives of isatins 2 (ac). Secondly, these compounds were reacted with different amines (sulphanilamide and 4-methyl sulphonyl aniline) separately, to obtain Schiff bases compounds 3 (ac) and 4 (ac), respectively. The synthesized compounds were characterized by using FT-IR and 1HNMR spectroscopy. The s

... Show More
Publication Date
Fri Apr 01 2011
Journal Name
Chinese Chemical Letters
Extraction of cobalt(II) from aqueous solution by N,N′-carbonyl difatty amides
...Show More Authors

The development of economic and environmentally friendly extractants to recover cobalt metal is required due to the increasing demand for this metal. In this study, solvent extraction of Co(II) from aqueous solution using a mixture of N,N0-carbonyl difatty amides (CDFAs) synthesised from palm oil as the extractant was carried out. The effects of various parameters such as acid, contact time, extractant concentration, metal ion concentration and stripping agent and the separation of Co(II) from other metal ions such as Fe(II), Ni(II), Zn(III) and Cd(II) were investigated. It was found that the extraction of Co(II) into the organic phase involved the formation of 1:1 complexes. Co(II) was successfully separated from commonly associated metal

... Show More
View Publication
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Sci.int.(lahore)
SOME NEW TYPES OF PERFECT MAPPINGS
...Show More Authors

In this work, we introduce a new kind of perfect mappings, namely j-perfect mappings and j-ω-perfect mappings. Furthermore we devoted to study the relationship between j-perfect mappings and j-ω-perfect mappings. Finally, certain theorems and characterization concerning these concepts are studied; j = , δ, α, pre, b, β

Preview PDF