Preferred Language
Articles
/
jnhm-198
A NEW SPECIES OF LIODONTOMERUS GAH. FROM IRAQ (HYMENOPTERA, TORYMIDAE)
...Show More Authors

A study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Global Pharma Technology
Synthesis of New 2, 4, 5-triphenyl imidazole Derivatives Derived from benzoin and Studying their Biological Activity
...Show More Authors

compound [1] was formed from the reaction of benzoin and benzaldehyde in the presence of ammonia, which was reacted with sodium hydride in DMF to obtain imidazole salt. This salt was reacted with adipoyl chloride to give compound [2]. Acid hydrazide derivative [3] was obtained from the reaction of compound [2] with hydrazine hydrate. After that Shiff bases [4-9] have been synthesized from the reaction of compound [3] with different aromatic aldehydes. These new formed compounds were diagnosed by 13C-NMR, 1H-NMR for some of them (in Ahl-Albate University in Jordan) and FT-IR spectroscopy (In Baghdad University). All of the prepared products have been studied their biological activities toward two kinds of bacteria. These products show

... Show More
Scopus (8)
Scopus
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis of Some New Schiff Bases Starting from 2,2 Dimorpholinyl Acetic Acid and Evaluating the Biological activity
...Show More Authors

n this study new derivatives of Schiff bases (5-10) were synthesized from the new starting material 1 . Which has been synthesized by the reaction of (1 mol.) of dichloroacetic acid with two moles of morpholine, in the presence of potassium hydroxide, Ester derivatives 2 and 3 were synthesized by the reaction of 1 with methanol or ethanol respectively in the presence of sulphuric acid as catalyst . Compound 2 was also prepared from dimethylsulphate with high yield , 2 and 3 was used to synthesized 2,2-dimorpholinylacetohydrazide 4 via reaction with NH2NH2.H2O 80% .Imines (5-10) were synthesized via the reaction of 4 with appropriate aromatic aldehydes in the presence of G.A.A as a catalyst . Derivatives compounds (1-10) were identifie

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jun 06 2021
Journal Name
University Of Baghdad
Synthesis, characterization, biological activity and thermal study of metal complexes with new ligands derived from succinyl chloride
...Show More Authors

Publication Date
Sat Oct 19 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activity of New Ligand     Derived from 4-‎(Dimethylamino) Benzaldehyde and Nano Copper Complex
...Show More Authors

الصيغة العامة للمعقدات الجديدة [M2(BDS)Cl4] الناتجة من تفاعل الليكاند الجديد] ن1,ن4-ثنائي(1أ –بنزو]د[ اميدازول-2-يل)-ن1,ن4-ثنائي(4-ثنائي مثيل امينو) بنزيل) سكسنمايد[ (BDS) مع الايونات الفلزية الكادميوم, الكوبلت, الزئبق, النحاس والنيكل. تم اشتقاق هذا الليكاند من تفاعل المواد الثلاث 4-(ثنائي ميثيل أمينو) بنزالدهيد، 2-أمينو بنزيميدازول، وكلوريد السكسينيل. تم تشخيص المركبات باستخدام مطيافية طيف الاشعة تحت الحمراء وطيف الرن

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization and Antibacterial Study of New 4-Thiazolidinone and Tetrazole Compounds Derived from Thiosemicarbazone and Hydrazones
...Show More Authors

A new 4-thiazolidinone, substitutedbenzylidene-thiazolidinone and tetrazole were synthesized from thiosemicarbazone and hydrazone. The thiosemicarbazone was prepared by the reaction of thiosemicarbazide with aldehyde derivative from L-ascorbic acid in absolute ethanol using glacial acetic acid as a catalyst. 1, 3-thiazolidin-4-ones were synthesized from the condensation of thiosemicarbazones with chloroacetic acid in presence of anhydrous sodium acetate. A 1, 3- thiazolidine-4-one was reaction with several 4-substitutedaldehydes to produce new derivatives with a double bond at the position-5 of the 4-thiazolidinone ring. While the tetrazole compounds were synthesized by 1, 3-cycloaddition reaction of sodium azide and hydrazone compounds in

... Show More
Preview PDF
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
COMPARATIVE STUDY OF SEVERAL MORPHOLOGICAL AND REPRODUCTIONAL ASPECTS FOR SOME SPECIES OF THE BELLEVALIA LAPEYROUSE, 1808 AND ORNITHOGALUM LINNAEUS, 1753 (ASPARAGALES, ASPARAGACEAE) IN CENTRAL AND NORTH OF IRAQ
...Show More Authors

This study aims to study some morphological and reproductional characteristics in eleven species of two genera belonging to the family of Asparagaceae, which are Bellevalia Lapeyrouse, 1808 and Ornithogalum Linnaeus, 1753 and the species are: Bellevalia chrisii Yildirim and Sahin, 2014; Bellevalia flexuosa Boissier, 1854; Bellevalia kurdistanica Feinbrun, 1940; Bellevalia longipes Post, 1895; Bellevalia macrobotrys Boissier, 1853; Bellevalia paradoxa Boissier, 1882; Bellevalia parva Wendelbo, 1973; Bellevalia saviczii Woronow, 1927; Ornithogalum brachystachys C. Koch, 1849; Ornithogalum neurostegium Boissier, 1882 and Ornithogalum pyrenaicum Linnaeus, 1753. These species were identified and compared with each other; the results showed th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref