Preferred Language
Articles
/
ijp-658
Effect of π-conjugated molecules on electronics properties of benzene-diamine derivatives
...Show More Authors

The present work shows a theoretical results that have been used the functional Hybrid of three parameters Lee-Yang-Parr (B3LYP) of the quantum mechanical approach for density functional theory with (Spanish Initiative for Electronic Simulations with Thousands of Atoms) SIESTA code. All calculations were carried out employing the used method at the Gaussian 09 package of programs. It was reported the main point for research on dominance of the bandgap of elongated pi-conjugated molecules by using different chemical groups replacing hydrogen atom in the most molecules that used in this work. The side groups creates another factor that controls the value of the band gap. The dihedral angle between the two phenyl rings plays more important role in controlling the band gap in these molecules.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Recycling waste papers in green cement mortars
...Show More Authors

This work investigates the utilization of waste papers (natural and industrial) i.e (citrus aurantium and papers A4) mortars containing specified contents 0.5%, 1%, 1.5% of waste papers were prepared and cured. Mechanical characteristics such as compressive and bending strengths, hardness and water absorption were determined for the mortars mixed with the waste papers and compared with those obtained from the pure mortars. Results showed that the addition of waste paper leads to increase the hardness to (69 - 68.5) shore D for (natural and industrial) wastes materials respectively comparing with pure specimen 66 shore D. The compressed strength of the mortar cement specimen cured for 28 days from 13 MPa to (17-18) MPa for (natural and in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Oscillating Problems Using Modifying Runge-Kutta Methods
...Show More Authors

     This paper develop conventional Runge-Kutta methods of order four and order five to solve ordinary differential equations with oscillating solutions. The new modified Runge-Kutta methods (MRK) contain the invalidation of phase lag, phase lag’s derivatives, and amplification error. Numerical tests from their outcomes show the robustness and competence of the new methods compared to the well-known Runge-Kutta methods in the scientific literature.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of some Metal Complexes with (3Z ,5Z, 8Z)-2-azido-8-[azido(3Z,5Z)-2-azido-2,6bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H1,7-dioxa-3,4,5-triazonine – 2,6 – dica
...Show More Authors

  The reaction of LAs-Cl8 : [ (2,2- (1-(3,4-bis(carboxylicdichloromethoxy)-5-oxo-2,5dihydrofuran-2-yl)ethane – 1,2-diyl)bis(2,2-dichloroacetic acid)]with sodium azide in ethanol with drops of distilled water has been investigated . The new product L-AZ :(3Z ,5Z,8Z)-2azido-8-[azido(3Z,5Z)-2-azido-2,6-bis(azidocarbonyl)-8,9-dihydro-2H-1,7-dioxa-3,4,5triazonine-9-yl]methyl]-9-[(1-azido-1-hydroxy)methyl]-2H-1,7-dioxa-3,4,5-triazonine – 2,6 – dicarbonylazide was isolated and characterized by elemental analysis (C.H.N) , 1H-NMR , Mass spectrum and Fourier transform infrared spectrophotometer (FT-IR) . The reaction of the L-AZ withM+n: [ ( VO(II) , Cr(III)  ,Mn(II) , Co(II) , Ni(II) , Cu(II) , Zn(II) , Cd(II) and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 07 2016
Journal Name
International Journal Of Science And Research
Synthesis, Characterization and Antimicrobial Activity Studies of Mixed-1,10-phenanthroline- Mn(II),Co(II), Cu(II), Ni(II) and Hg(II) Complexes with Schiff Base[2,2'-(1Z,1'Z)-(biphenyl-4,4'- diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol]
...Show More Authors

Abstract: The M(II) complexes [M2(phen)2(L)(H2O)2Cl2] in (2:1:2 (M:L:phen) molar ratio, (where M(II) =Mn(II), Co(II), Cu(II), Ni(II) and Hg(II), phen = 1,10-phenanthroline; L = 2,2'-(1Z,1'Z)-(biphenyl-4,4'-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol] were synthesized. The mixed complexes have been prepared and characterized using 1H and13C NMR, UV/Visible, FTIR spectra methods and elemental microanalysis, as well as magnetic susceptibility and conductivity measurements. The metal complexes were tested in vitro against three types of pathogenic bacteria microorganisms: Staphylococcus aurous, Escherichia coli, Bacillussubtilis and Pseudomonasaeroginosa to assess their antimicrobial properties. From this study shows that a

... Show More
Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
The Correlation between CMV Infection and Hypertension in Iraqi Patients
...Show More Authors

In order to study the correlation between CMV infection and increase in blood pressure among Iraqi patients, 201 blood samples were collected including; 88 male, 113 female hypertensive patients and 40 control samples. Patients sera were grouped into patients who are under medication (T), and patients who do not take any treat-ment for hypertension(NT). Samples were tested for CMV-IgM/IgG by ELISA, ren-in enzyme and interleukin-6(IL-6) levels were determined by ELISA too. The opti-cal density readings difference for CMV-IgG were significant between (T) and (NT) groups as well as when each group compared to control, level of renin enzyme showed significant difference between patients group(T and NT) and between each group compared to the

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Estimating Demand for Imported Food Categories in Iraq
...Show More Authors

Iraq is highly dependent on international markets to provide food for its residents. As imported food prices are highly dependent on crude oil prices in global markets, any shock in oil prices will have an impact on food consumption in the country. As a result, it is essential to study the demand for imported food at every time period. To the best of our knowledge as researchers, as not even a single study is available in the literature, this paper is considered the first to study the demand for imported food groups in Iraq. Therefore, the main objective of this research is to estimate demand elasticities for several imported food categories in Iraq. This study uses an Almost Ideal Demand System model to analyze the demand for imported f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Intrusion Detection System Using Data Stream Classification
...Show More Authors

Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 09 2021
Journal Name
Political Sciences Journal
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

View Publication Preview PDF
Crossref