Preferred Language
Articles
/
jih-2384
New N-triaryl-substituted polyamides materials as light Emitters for semiconductors applications
...Show More Authors

     In this work, new di-acid monomers 4, 4’-di-carboxillic-2”-chloro-4”- nitro triphenylamine (Di-CO2H-1), 4, 4’- di-carboxylic -2”,4”,6”-trichloro-triphenylamine (Di-CO2H-2) were synthesized by reaction of p-cyanobenzofluride with two aromatic amines (2-chloro 4-nitro aniline and 2,4,6-trichloro aniline by aromatic nucleophilc substitution method to produce two di cyano intermediates compounds 4, 4’-Dicyano-2”-chloro-4”- nitro triphenylamine (Di-CN1) and 4, 4’-dicyano-2”,4”,6”-trichloro-triphenylamine (Di-CN2) which form final di-carboxylic monomers after alkaline hydrolysis. Finally, these monomers react with two different aromatic di amines, phenylene diamins and benzidine respectively via polycondensation reaction to form final polyamides 2”-chloro-4”- nitro -triphenylamine-4, 4'-polyphenylbenzamide (Pa), 2”,4”,6”-trichloro-triphenylamine -4,4'-polyphenylbenzamide (Pb), 2”-chloro-4”- nitro triphenylamine-4,4'- polyphenylbiphenylamide (Pc), 2”,4”, 6”-trichloro-triphenylamine-4,4’- polyphenylbiphenylamide (Pd).

The chemical structure of these polymers characterized by FTIR and NMR techniques. The polyamides showed a good thermal stability with height glass transition temperatures (Tg).

Thin casting films of these polyamides in cyclic voltammetry (C.V) on glass substrate of iridium-tin oxide (ITO) as working electrode in dry CH3CN solvent contains 0.1 M of tetrabutylantimoneperchlorate (TBAP) as an electrolyte gave one redox wave.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
A New Hybrid Meta-Heuristics Algorithms to Solve APP Problems
...Show More Authors
Abstract<p>In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.</p>
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
New algorithms to Enhanced Fused Images from Auto-Focus Images
...Show More Authors

Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
New sizes of complete (k, 4)-arcs in PG(2,17)
...Show More Authors

              In this paper, the packing problem for complete (  4)-arcs in  is partially solved. The minimum and the maximum sizes of complete (  4)-arcs in  are obtained. The idea that has been used to do this classification is based on using the algorithm introduced in Section 3 in this paper. Also, this paper establishes the connection between the projective geometry in terms of a complete ( , 4)-arc in  and the algebraic characteristics of a plane quartic curve over the field  represented by the number of its rational points and inflexion points. In addition, some sizes of complete (  6)-arcs in the projective plane of order thirteen are established, namely for  = 53, 54, 55, 56.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
International Journal Of Applied Pharmaceutics
THE IMPACT OF NEW TARGETING METHODS IN THE CANCER THERAPY
...Show More Authors

Rapid development has achieved in treating tumor to stop malignant cell growth and metastasis in the past decade. Numerous researches have emerged to increase potency and efficacy with novel methods for drug delivery. The main objective of this literature review was to illustrate the impact of current new targeting methods to other previous delivering systems to select the most appropriate method in cancer therapy. This review first gave a brief summary of cancer structure and highlighted the main roles of targeting systems. Different types of delivering systems have been addressed in this literature review with focusing on the latest carrier derived from malarial protein. The remarkable advantages and main limitations of the later

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Synthesis and Curing of New Phenolic Resins Containing Pendant TetrachloroPhthalimides
...Show More Authors

Four new phenol-formaldehyde resins containing tetrachlorophthalimides in their repeating units were synthesized via condensation of formaldehyde with N-(hydroxy phenyl)tetrachlorophthalimides under conditions similar to those used in novolac preparation. In this work structural modifications were performed first via design and synthesis of new phenolic component represented by phenolic ring linked to thermally stable tetrachlorophthalimide moiety which condense with formaldehyde and second via introducing of phenolic hydroxyl groups present in the new synthesized resins by esterification reaction with acetyl chloride producing the corresponding acetoxy substituted resins. Both the prepared and the cured resins have new properties which

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Victorian Society’s Fear of the New Woman in Bram
...Show More Authors

Nineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.

View Publication Preview PDF
Crossref