Preferred Language
Articles
/
jih-1646
Modification of PVC and PVC Copolymer by Substitution Imide Groups
...Show More Authors

In this work the poly vinyl imides were prepared as thermal l y stable polymers by modified PVC and PVC copolymers \'lith different cyclic imides such as naphtha imide, phtbal imide, male imide and succin imide as a pendant groups.

This method gave new polyimides, from considered  especially plastic because of their outstanding high  performance properties. As

such, they are priced well above commodity polymers such as PVC

and PVC copolymers.

All the prepared polymers were characterized by IR, UV spectroscopy, elemental analysis and chemical reactions, and thermal analysis such as DTA and TG. Physical properties and the viscosities for all prepared polyimides were determined by using DMF as a solvent. This method gave good results and the new modification  of PVC thermoplastic  polymer to the PVC-link  with  different  irn i des gave higher the1mally stable polymers compaired with the origin PVC polymer.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Sensitize the electrical properties of partial substitution on mercury-base superconductor manufactured by the solid reaction method
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis of N-benzothiazole derivative imide on polymeric chain, have possible biological activity
...Show More Authors

In this reserch Some new substituted and unsubstituted poly imides compounds. were synthesized by reaction of acrylol chloride with different amides (aliphatic and aromatic) in a suitable solvent in the presence amount triethyl amine (Et3N) with heating. The Structure confirmation of all polymers were confirmed using FT-IR,1H-NMR,13C-NMR and UV spectroscopy. Thermal analysis (TG) for some polymers showed their thermal stabilities. Other physical properties including softening points, melting point and solubility of the polymers were also measured

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Baghdad Science Journal
Adsorption and Kinetic Study of Methylene Blue dye on New Surface Derived from Copolymer (Melamine – Formaldehyde – Para- methyl Anisole)
...Show More Authors

A new copolymer (MFA) was prepared from condensation of melamine (M) with p- methyl – anisole (A) in the presence of condensation agent like 37% (w/v) of formaldehyde. The new copolymer was characterized by elemental, IR and HNMR spectra. The chelating ion-exchange property of this polymer was studied for methylene blue dye in aqueous solution in 100-200ppm concentrations. The adsorption study was carried out over a wide range of pH, shaking time and in media of various kinetic parameters models. Thermal parameters like enthalpy, entropy and Gibbs free energy of adsorption process of methylene blue on surface of MFA resin were determined on the basis of kinetic parameters at different temperatures. To describe the equilibrium of adsorp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Synthesis and Polymerization of Poly Acryl Imide and One of Their Derivatives Then Curing the Product with Alkyl Halide
...Show More Authors

The present work involved four steps: First step include reaction of acrylamide ,N-?-Methylen-bis(acryl amide) and N-tert Butyl acryl amide with poly acryloyl chloride in the presence of triethyl amine (Et3N) as catalyst, the second step include homopolymerization of all products of the first step by using benzoyl peroxide(BPO) as initiator in (80-90)Co in the presence of Nitrogen gas(N2). In the third step the poly acrylimide which prepare in second step was convert into potassium salt by using alcoholic potassium hydroxide solution. Fourth step include Alkylation of the prepared polymeric salts in third step by react it with different alkyl halides(benzyl chloride, allylbromide , methyl iodide) by using DMF as solvent for(10-12) hours.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Ecological Engineering
Modification of Electro-Fenton Process with Granular Activated Carbon for Phenol Degradation – Optimization by Response Surface Methodology
...Show More Authors

As a result of rapid industrialization and population development, toxic chemicals have been introduced into water systems in recent decades. Because of its excellent efficiency and simple design, the three-dimensional (3D) electro-Fenton method has been used for the treatment of wastewater. The goal of the current study is to explore the efficiency of phenol removal by the 3D electro-Fenton process, which is one of the advanced oxidation processes (AOPs). In the present work, the effect of the addition of granular activated carbon (GAC) particles to the electro-Fenton system as the third electrode would be investigated in the presence of graphite as the anode and nickel foam as the cathode, which is the source of electro-generated hydrogen

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 17 2022
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Calculation for the groups
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Steganography Based on Wavelet Transform and Histogram Modification
...Show More Authors

      Recently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 15 2021
Journal Name
Al-qadisiyah Journal Of Pure Science Vol.(26) Issue (special Issue Num.4) (2021) Pp. 27–30
Cyclic partition for the groups of (2,41) and (2,43)
...Show More Authors