Preferred Language
Articles
/
iReX4I8BVTCNdQwCP3-H
Synthesis of New type of tetrazoles starting from D-ribose
...Show More Authors

This work includes synthesis of sugar tetrazole derivative, D-ribose reacted with acetone in the presence of sulfuric acid H2SO4 to give 2, 3-O-isopropylidene-D-ribose (1). The Aldol condensation of (1) with formaldehyde in methanolic K2CO3 solution gave 2-hydroxymethyl (2, 3-O-isopropylidene-D-ribose)(2). Which was tosylated by Tosyl chloride in pyridine to yield compound (3), SN2 reaction of (3) with sodium cyanide in DMSO afforded compound (4). The [2+ 3] cycloaddition reaction of (4) with sodium azide gave the targeted compound (5). All prepared compounds have been characterized by: TLC, Specific rotation, Microelemental analysis and [FTIR and 1 H NMR spectroscopy]

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
A new vision for the classic in contemporary fashion designResearch
...Show More Authors

        fashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages      The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Nov 09 2022
Journal Name
International Journal Of Special Education
Adsorption of Methylene Blue from Their Aqueous Solution
...Show More Authors

Publication Date
Wed Sep 09 2009
Journal Name
University Of Baghdad
Estimation of Reservoir Rock Properties from Well Measurements
...Show More Authors

Porosity and permeability are the most difficult properties to determine in subsurface reservoir characterization. The difficulty of estimating them arising from the fact that porosity and permeability may vary significantly over the reservoir volume, and can only be sampled at well location. Secondly, the porosity values are commonly evaluated from the well log data, which are usually available from most wells in the reservoir, but permeability values, which are generally determined from core analysis, are not usually available. The aim of this study is: First, to develop correlations between the core and the well log data which can be used to estimate permeability in uncored wells, these correlations enable to estimate reservoir permeabil

... Show More
Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
Production of Biodiesel Fuel from Used vegetable Oil
...Show More Authors

Used vegetable oil was introduced to transesterfication reaction to produce Biodiesel fuel suitable for diesel engines. Method of production was consisted of filtration, transesterfication, separation and washing. Transesterfication was studied extensively with different operating conditions, temperature range (35-80oC), catalyst concentration (0.5-2 wt. % based on oil), mixing time (30-120 min.) with constant oil/methanol weight ratio 5:1 and mixing speed 1300 rpm. The concentration of Fatty acid methyl esters (Biodiesel) was determined for the transesterficated oil samples, besides of some important physical properties such as specific gravity, viscosity, pour point and flash point. The behavior of methyl esters production and the physica

... Show More
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Extraction conditions of polyphenol oxidase from banana peel
...Show More Authors

Polyphenol oxidase (PPO) is an enzyme containing copper, presents in various fruits and vegetables. It is responsible for the browning reactions when the cells are damaged during handling. The best conditions for extraction of polyphenol oxidase from banana peel was by using an extraction buffer containing phosphate buffer (0.05 M, pH 7), 0.01 M ascorbic acid and 0.5% polyethylene glycol, with extraction ratio 1:4 (w:v) for one minute by using blender. The enzyme activity was measured spectrophotometrically at 425 nm. PPO was studied to prevent the browning of banana peel which results in the loss of their marketability. The aim of this study was to determine the optimum conditions for polyphenol oxidase extraction from banana peel.

View Publication Preview PDF
Crossref (1)
Crossref