Preferred Language
Articles
/
jih-2983
Preparation, Characterization, Theoretical and Biological Study of new Complexes with mannich base , 2chloro –N-5-(Piperidin -1-ylmethylthio)-1, 3, 4- Thiadiazol-2-yl)acetamide
...Show More Authors

A new Mannich base ligand was prepared by reacting the 2-chloro.-N-(5-mercapto-1, 3, 4-thiadazol -2-yl) acetamide and Piperidine in the presence (formaldehyde) (L) ligand. A series of ligand complexes were prepared from (L) with the metal ion Co (II), Ni (II), Cu (II), Pd (II), Pt (IV), and Au (III). Various spectroscopic techniques such as C.H.N.S, FTIR, UV-VIS, , 1HNMR, 13CNMR, Magnetic moment, and molar conductivity successfully characterize the obtained compounds. The M: L ratio was determined using the molar ratio method in solution. All prepared compounds' antibacterial and antifungal activity was studied against two types of bacteria and one type of fungi at a rate of 0.02M. The standard ΔH° f and ΔEb of the ligands and all the prepared complexes were calculated using Hyperchem 8.0.7 program, and the study proved that the complexes are more stable than the ligands. In addition, the vibrational frequencies of the ligand were calculated, and the theoretical error rate of the process was calculated.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 15 2021
Journal Name
Biochem. Cell. Arch.
CYTOKINES SERUM PROFILE IMMUNOSUPPRESSANT BALB/C MICE INFECTED WITH CRYPTOSPORIDIUM PARVUM
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Annals Of R.s.c.b.
Multidrug Resistant Enteric Bacteria Isolated From Patients With Urinary Tract Infections
...Show More Authors

Background and Objectives: Urinary tract infections (UTIs), among a wide range of microbial infections, are of a double-edged worry with health-care and economic implications. They are serious diseases that can influence various parts of the urinary tract. The aim of this study was characterization of the enteric bacteria isolated from urine of human UTIs and studying their antimicrobial sensitivity. Materials and methods: A total of 50 urine samples were collected from patients with UTIs of both genders. The isolates identification was done using routine diagnostic methods and confirmed by Vitek2. Antimicrobial susceptibility was done against 10 antimicrobials. Results: Both genders of human were found to suffer from urinary tract problems

... Show More
Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Ijid Regions
Systemic sclerosis presents its cutaneous manifestations with innovative triple therapeutic regime
...Show More Authors

Scopus
Publication Date
Mon May 16 2016
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
MINIMIZING WAITING TIMES USING MULTIPLE FUZZY QUEUEING MODEL WITH SUPPLY PRIORITIES
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Hybrid Techniques with Support Vector Machine for Improving Artifact Ultrasound Images
...Show More Authors

     The most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
On Solving Singular Multi Point Boundary Value Problems with Nonlocal Condition
...Show More Authors

In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Some Results On Lie Ideals With (σ,τ)-derivationIn Prime Rings
...Show More Authors

In this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 03 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Hepatitis G virus infection among Iraqi patients with Chronic liver diseases.
...Show More Authors

Background: The hepatitis G virus( HGV), also called hepatitis GB virus, as a member of the Flaviviridae family distantly related to hepatitis C virus (HCV), Little is known about the frequency of HGV infection, the nature of the illness, or how to prevent it. What is known is that transfused blood containing HGV has caused some cases of hepatitis. They infect humans, but are not known to cause human disease. This virus can be transmitted efficiently by blood transfusion and by other parenteral mechanisms. Transient and long lasting infections with HGV have been documented in man.
Patients and methods: HBs Ag, Anti-HCV IgG and Anti-HGV IgG were detected by Enzyme-Linked Immunosorbent Assay (ELISA).HCV RNA

... Show More
View Publication Preview PDF
Crossref