Preferred Language
Articles
/
hhcs6o8BVTCNdQwCuYAz
Synthesis, Characterization and Antimicrobial Evaluation for New Esters Derivatives Containing Two 1, 3, 4-Oxadiazole Units
...Show More Authors

     This work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxicity demonstrates non-toxicity with acute oral human toxicity. Also, the toxicity of these compounds in rats was weak. A molecular modelling study explains that these compounds possess good binding with lung cancer proteins.

Scopus Crossref
View Publication
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Solar ray tracing programs to find new types of solar
...Show More Authors

Anew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.

View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A new species of genus stachys L. (Lamiaceae) in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Jul 01 2003
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORDS OF SOME MITE SPECIES INHABITING SOIL IN BAGHDAD
...Show More Authors

The soil acari fauna of Citrus orchards of Baghdad in Jadiriya area was studied in a total
of forty-eight samples. Twenty-two species were recorded during the present study of which
eight species were first records to Iraq. The ordinal composition of the soil acari fauna was
predominantly Mesostigmata.
This fauna represents diverse trophic groups. The most abundant groups were the
predacious and the Microphytophagus, while the less abundant groups were the predacious/
Microphytophagus, Macrophytophagus, and Panaphytophagus. The most abundant and
frequent species were Rhizoglyphus sp. Tyrophagus putrescentiea (Scrank), Pachylaelaps
longisetis Halbt. and Stratiolaelaps miles Berl.

View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Victorian Society’s Fear of the New Woman in Bram
...Show More Authors

Nineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DESCRIPTION OF NEW SPECIES OF TERMITES (INSECTA, ISOPTERA) FROM IRAQ
...Show More Authors

Two specie's of terrnitls are described as new to science from Iraq Amitermes corpnlentus sp. n. and Anacanthotermes savvensis sp. n., with two figures.

View Publication Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
New records of Turbellarian Platyhelminthes from Al-Dalmage lake / Iraq
...Show More Authors

A total of 437 individuals of Turbellarin Platyhelminthes were sorted from benthic samples collected monthly for a period of seven months( April to November 2013 ) from AL-Dalmage lake, a part of middle section for main outfall drain south of Baghdad. They were identified as Gyratrix hermaphroditus, Stenostomum leucops ,Stenostomum unicolar and Stenostomum bryophilum ,The relative abundance of worms decreased during hot season which (May to September) ,where they start rising again. The species were studied alive , the identification criteria were illustrated by photos. G. hermaphroditus was the most abundant species among the four species.

View Publication Preview PDF
Crossref