Preferred Language
Articles
/
ijs-9594
Synthesis and Characterization of Some Transition Metal Complexes with a New2-(1,2-dihydroxyethyl-1-(2-mercaptophenyl)-5-(2 mercaptophenylimino)-2,5-dihydro-1H-pyrrol-3,4- diol.
...Show More Authors

2-(1,2-dihydroxy ethyl -1- (2-mercaptophenyl)-5-(2-mercaptophenyl imino)-2,5-dihydro-1H-pyrrol-3,4-diol(H2L`)a lactam derivative of L-ascorbic acid was prepared by reaction of 5,6-O-isopropylidene L-ascorbic acid with 2-amino thiophenol in a mole ratio of (1:2) respectinely. A series of new metal complexes of this ligand (H2L`) were prepared by a reaction with the chlorides of Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II). The new ligand and its metal complexes were characterized by C.H.N.,1H and 13C NMR, IR as well as UV-Visible spectra and mass spectra of Ni(II) and Zn(II) complexes was also done. Atomic absorption of the metal percentage, electrical conductivity and magnetic measurements at room temperature was carried out. From these analysis showed that the ligand H2L` (C18H18O4N2S2) is coordinated to the metal ions through the nitrogen atom of the azomethine group and the two sulphur atoms of thiol groups as a tridentate ligand or through the two sulphur atoms of thiol groups as a bidentate ligand an octahedral geometries, except the (Hg) complex which shows a tetrahedral. Theoretical calculations of the electronic structure of the new ligand HL and its metal complexes were carried out applying the semi-emiprical computation methods PM3 and PM6 which confirmed the suggested structures of all complexes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 06 2010
Journal Name
Journal Of Engineering
A PROPOSED PROCEDURE FOR ANALYSING REINFORCED EMBANKMENTS
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Education For Pure Science- University Of Thi-qar
Dorsal Hand Vein Image Recognition: A Review
...Show More Authors

Subcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and

... Show More
Publication Date
Fri Dec 20 2024
Journal Name
Philosophy Journal
Richard Rorty: Toward a Philosophy Without Mirrors
...Show More Authors

View Publication
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of The College Of Basic Education
A Proposed Steganographic Method in Digital Media
...Show More Authors

WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg

... Show More
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Building a Visual Test for Kindergartens’ children
...Show More Authors

The present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.

View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Semisimple Modules Relative to A Semiradical Property
...Show More Authors

    In this paper, we introduce the concept of s.p-semisimple module. Let S be a semiradical property, we say that a module M is s.p - semisimple if for every submodule N of M, there exists a direct summand K of M such that K ≤ N and N / K has S. we prove that a module M is s.p - semisimple module if and only if for every submodule A of M, there exists a direct summand B of M such that A = B + C and C has S. Also, we prove that for a module M is s.p - semisimple if and only if for every submodule A of M, there exists an idempotent e ∊ End(M) such that e(M) ≤ A and (1- e)(A) has S. 

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Human Recognition Using Ear Features: A Review
...Show More Authors

Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time.  In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Thu Jul 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Forecasting enhancement using a hodrick-prescott filter
...Show More Authors

: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod

... Show More
Preview PDF
Scopus
Publication Date
Wed Sep 22 2021
Journal Name
Samarra Journal Of Pure And Applied Science
Toward Constructing a Balanced Intrusion Detection Dataset
...Show More Authors

Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff

... Show More
View Publication
Crossref (6)
Crossref