Preferred Language
Articles
/
dhZmXIoBVTCNdQwCdZxB
Synthesis, spectral studies, DFT, biological evaluation, molecular docking and dyeing performance of 1-(4-((2-amino-5-methoxy)diazenyl)phenyl) ethanone complexes with some metallic ions
...Show More Authors

Four Co(II), (C1); Ni(II), (C2); Cu(II), (C3) and Zn(II), (C4) chelates have been synthesized with 1-(4-((2-amino- 5‑methoxy)diazenyl)phenyl)ethanone ligand (L). The produced compounds have been identified by using spectral studies, elemental analysis (C.H.N.O), conductivity and magnetic properties. The produced metal chelates were studied using molar ratio as well as sequences contrast types. Rate of concentration (1 ×10􀀀 4 - 3 ×10􀀀 4 Mol/L) sequence Beer’s law. Compound solutions have been noticed height molar absorptivity. The free of ligand and metal chelates had been applied as disperse dyes on cotton fabrics. Furthermore, the antibacterial activity of the produced compounds against various bacteria had been investigated. For the gained datum, a tetrahedral geometrical structure has been suggested for each primed complex. Molecular docking investigation was carried out to ascertain the inhibitory action of the studied compounds against 1HNJ protein, the target enzyme for the antimicrobial agents. The findings showed that, when compared to other compounds, (C1) has the highest binding affinity. Therefore, these molecules might make good candidates for antimicrobials. The quantum chemical parameters are calculated, and the molecular structure complexes were theoretically optimized.

Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Prayer sessions are the truth and the opinions of scholars
...Show More Authors

The ritual is a Sunnah between the two prostrations, not as some of the worshipers do, where he made it in the last tashahhud when the tasleematin, and it may be in the last tashahhud.
The assumption is Sunnah and most of the scholars say that in the middle tashahhud session as we have shown through research.
The Turks are Sunnah as well, and it is at the end of the prayer, whether it is double, triple or quadruple, whether it is naval or NAFTA, whether it is urban or travel, which is the view of most scholars from the three imams and others.
If we say weighting, say the audience of the three imams (Malik, Shafi'i, and Ahmad) is the most correct, and it is also the son of values, and if we say the choice is as Ibn Rushd said: by

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
...Show More Authors

With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Earthly Identity of Public and Private Kindergarten Children Comparative Study
...Show More Authors

The study is concerned with the problem of the earthly identity of kindergarten children by verifying its aims in identifying the earthly identity of the first level of kindergarten children and the earthly identity of both levels of the kindergarten. The research also aims to identify the earthly identity of male and female kindergarten children. The study population is represented in public and private kindergartens on both sides of Baghdad city, Karkh & Rusafa for the academic year (2022-2023). The earthly identity test in its final form consisted of (10) items. The test was administered to a sample of (400) children in public and private kindergartens, who were selected randomly. The results showed that kindergarten children have

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Salinity Variation of Euphrates River between Ashshinnafiyah and Assamawa Cities
...Show More Authors

AshShinnafiyah and AsSamawa cities suffer from significant increase in salinity of Euphrates River water compared with their counterpart's north AshShinnafiyah city which is reflected adversely on the quality of water within the study area. The study aims to find possible solutions to avoid the deterioration of Euphrates River northern AshShinnafiyah city until AsSamawa city that were
presented by total dissolved solid TDS. Twelve main hydrological and fifteen salinity measurement stations were selected to cover 117 km of the river reach within the study area during July-2011. Additional twenty three hydrological and salinity stations were adopted during March-2012, winter season to the river within the study area. After conducting t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Corrosion Behavior of Copper and Carbon Steel in Acidic Media
...Show More Authors

The corrosion behavior of copper and carbon steel in 1M concentration of hydrochloric acid (HCl) and sulphuric acid (H2SO4) has been studied. The corrosion inhibition of copper and carbon steel in 1M concentration of hydrochloric acid (HCl) and sulphuric acid (H2SO4) by Ciprofloxacin has been investigated. Specimens were exposed in the acidic media for 7 hours and corrosion rates evaluated by using the weight loss method. The effect of temperature (from 283 ºK to 333 ºK), pH (from 1to 6), inhibitor concentration (10-4 to 10-2) has been studied. It was observed that sulphuric acid environment was most corrosive to the metals because of its oxidizing nature, followed by hydrochloric acid. The rate of metal dissolution increased with incre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Partial purification and characterization of xylanase from Bacillus cereus X3
...Show More Authors

Three strain of Bacillus cereus were obtained from soil sours Laboratories of Biology Department/ College of Science/ University of Baghdad. The bacteria secreted extracellular xylanase in liquid cultur the test ability of xylanase production from these isolates was studied semi quantitative and quantitative screening appeared that Bacillus cereus X3 was the highest xylanase producer. The enzyme was partial purification 191 fold from cultur by reached step by 4 U/mg proteins by ammonium sulfat precipitation 80%, Ion exchang DEAE-cellulos chromatography Characterization study of the partial purifation enzyme revealed that the enzyme had a optimum activity pH8 and activity was stable in the pH rang (8-10) for 30min. maximal activity was attai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared Methods of Generating Both Gamma Distribution and Beta Distribution
...Show More Authors

Beta Distribution

Abstract

             Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions.    &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Infants’ Obesity and Overweight in Relation to Type of Feeding
...Show More Authors

Abstract Objective (s): To identify the prevalence of obesity and overweight in infants and children less than 2 years of age and its relationship with type of feeding in a sample of children attending Al- Kadhymia primary health care center. Methodology: This study was a descriptive survey carried out in, the primary health care centre of Al-Kadhymia town in Baghdad during the period from 5th of July 2009-1st of May 2010. Sample was chosen by non probability convenience sampling and it included 744 infant and children. Data were gathered by a combination of a structured questionnaire and measurements o

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref