Preferred Language
Articles
/
jih-3059
Synthesis, Spectral Identification, Thermal and Antioxidant Studies for Ni (II), Pd (II), Pt (IV) and Au (III) Complexes With New Azo Ligand Derivatives from Tryptamine
...Show More Authors

In this study, a new Azo ligand 5-((2-(1H-indol-2-yl)ethyl)diazinyl)-2-aminophenol is synthesized from a reaction of Tryptamine with 2-aminophenol. The ligand and their metal ion complexes Ni(II), Pd(II) , Pt(IV) and Au(III) have been synthesized and characterized by various analytical techniques, including elemental microanalysis, metal content, chloride-containing, measurement of electrical conductivity, magnetic susceptibility, 1H and 13C-NMR, FT-IR, UV-Vis, mass spectra (MS), and thermal analysis (TGA and DSC) curves. The DCS curve was used to calculate the thermodynamic parameters ΔH, ΔS, and ΔG. The characterization results promote the metal complexes of azo ligand structures. The results indicate that the ligand behaves as a trident N, N, and O donor ligand for each and every produced complex, and the molar conductivity of all complexes indicates that none of the complexes were electrolytes. The antioxidant activity of the synthesized compounds was evaluated and determined against the DPPH radical (1.1-diphenyl-2-picrylhydrazyl) and compared to that of a standard natural antioxidant, gallic acid. The results show that the metal complexes are more effective at scavenging free radicals.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jul 25 2018
Journal Name
International Journal Of Engineering Trends And Technology
Fixed Predictor Polynomial Coding for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Feb 17 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Deploying Facial Segmentation Landmarks for Deepfake Detection
...Show More Authors

Deepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
Appearances of family Disintegration for Delinquency females
...Show More Authors

Family social institution mission in the community, if and repaired Magistrate society and often lead that institution a positive role in the socialization, but a variety of factors ailing infect system family Vtfkdh role effective and influential in society and stands at the forefront of those factors disintegration family, whether caused by the death of one or both parents, divorce or separation, or whether the result of domestic weakness and poor family behavioral practices. And gaining the study of great importance and that the scarcity of studies that address the problem of delinquency female, is no secret that stand on the fact the role of disintegration family in the events of that problem will help and a large degree in the devel

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
Political behavior for generations (Iraq's case study)
...Show More Authors

The topic area of that’s research dealing with values which adopted by Iraqi people since 1980, many changes and variables which make many situations and skills which the life is suitable in war and conflicts times. That’s values like traditional and ordering, traditionalism mean the conservation about values s and tradition which society adopted its. The Iraqi society suffering from many changes since 1980-2003, the consequently of that’s changes make Iraqi citizen more interested about luxury needs like clothes, while decreasing the interested about liberty of thought, beauty, show evidence of identity, and openness of mind. The processing of values changes associated with political behavior of Iraqi people which lead to weaken o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Adsorption Study for Trifluralin on Iraqi ? –Alumina
...Show More Authors

Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
INITIAL COLLECTION EFFICIENCY FOR GLASS FILTER MEDIA
...Show More Authors

This study investigated the ability of using crushed glass solid wastes in water filtration by using a pilot plant, constructed in Al-Wathba water treatment plant in Baghdad. Different depths and different grain sizes of crushed glass were used as mono and dual media with sand and porcelaniate in the filtration process. The mathematical model by Tufenkji and Elimelech was used to evaluate the initial collection efficiency η of these filters. The results indicated that the collection efficiency varied inversely with the filtration rate. For the mono media filters the theoretical ηth values were more than the practical values ηprac calculated from
the experimental work. In the glass filter ηprac was obtained by multiplying ηth by a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 12 2017
Journal Name
Journal Of Engineering
Regulations Enforcement Mechanisms for Sustainable Housing Projects
...Show More Authors


 

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Industrial Recycling Process of Batteries for EVs
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF