Preferred Language
Articles
/
jih-90
Synthesis and Characterization of Schiff Base Derived From Chitosan and Its Complexes With (Co+2, Ni+2 and Cu+2)
...Show More Authors

     In this research, new Schiff base is derived from chitosan O-nitrobenzyldehyde and its complexes were synthesized. All compounds were characterized by FT-IR, UV-Visible, TGA, DTA, TG and molar conductivity with melting point. The results showed that Schiff base was coordinated via  nitrogen atom azomethine with the center metal ions Co+2,Ni+2 and Cu+2 behaving monodentate ligand and forming complexes with molecular formula [M(L)Cl2H2O] The tetrahedral geometrical was suggested for all prepared complexes based on the characterization data for all techniques.   +2,Cu+2, Ni+2M = Co   

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
Comparative biosimilar quality studies between a rituximab product and MabThera
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jul 16 2012
Journal Name
International Journal Of Business And Manegement
Causality Relation between FDI Inflows and Economic Growth in Qatar
...Show More Authors

These years Qatar has emerged as an important regional destination of foreign direct investment (FDI), which demonstrates the recent success of several smaller economies in attracting FDI. This paper aims to investigate the causal relationships between inward FDI and economic growth in the particular case of Qatar featured as oil production country. Vector Autoregressive (VAR) Impulse Responses and Granger Causality Tests were adopted as major research methods. Annual data set was used covering from 1990 to 2010. The main results demonstrated the bi-directional causality and long-run relationships between FDI inflows and economic growth in Qatar. And to attract FDI inflows into Qatar, the government shall continue its efforts in const

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Image Content Verification based on DWT and Chaotic Map Watermarking
...Show More Authors

     Image content verification is to confirm the validity of the images, i.e. . To test if the image has experienced any alteration since it was made. Computerized watermarking has turned into a promising procedure for image content verification in light of its exceptional execution and capacity of altering identification.

     In this study, a new scheme for image verification reliant on two dimensional chaotic maps and Discrete Wavelet Transform (DWT) is introduced. Arnold transforms is first applied to Host image (H) for scrambling as a pretreatment stage, then the scrambled host image is partitioned into sub-blocks of size 2×2 in which a 2D DWT is utilized on  ea

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Building Words Dictionary List Using Symbol Enumeration and Hashing Methodology
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
Leadership and Internal Communication Strategies in Public Organizations: Analytical Research
...Show More Authors

Purpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership.   Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance.   Design/methodology/approach: The  study  uses the  ordinary  least  squares  (OLS) and  applied multiple  regression A sa

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2012
Journal Name
First Eage Workshop On Iraq - Hydrocarbon Exploration And Field Development
Microfacies and Petrographic study for Yamama formation in Ratawi field
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Computer Science Issues (ijcsi)
Near Rough and Near Exact Subgraphs in Gm-Closure spaces
...Show More Authors

The basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.

Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More