Preferred Language
Articles
/
kBez4o8BVTCNdQwC_X_i
Synthesis, Antibacterial and Molecular Docking Study of Novel 2-Chloro-8-Methoxy-3-Aryl-[1,3] Benzoxazine Derivatives Using Vilsmeier Reagen
...Show More Authors

Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl) amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones(5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones wassecerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds(5a) showed mild antibacterial activity. Compounds (5d–i) did not display notable activity. The molecular docking of synthesised compounds were tested inside the pocket of bacterial gyrase enzyme target site by using MOE 2015 software, which acts as Adenosine triphosphate (ATP)-binding domain bacterial gyrase enzyme pocket and novobiocin was used as reference.

Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Study of the Electronic Properties and Hall Effect of Amorphous Si1-xGex:H Thin Films
...Show More Authors

The electronic properties and Hall effect of thin amorphous Si1-xGex:H films of thickness (350 nm) have been studied such as dc conductivity, activation energy, Hall coefficient under magnetic field (0.257 Tesla) for measuring carrier density of electrons and holes and Hall mobility as a function of germanium content (x = 0–1), deposition temperature (303-503) K and dopant concentration for Al and As in the range (0-3.5)%. The composition of the alloys and films were determined by using energy dispersive spectroscopy (EDS) and X-ray photoelectron spectroscopy (XPS).
This study showed that dc conductivity of a-Si1-xGex:H thin films is found to increase with increasing Ge content and dopant concentration, whereas conductivity activati

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Study the Effect of Ceramic Coating on the Performance and Emissions of Diesel Engine
...Show More Authors

In this study, the effect of ceramic coating on the performance and gases emission on diesel engine was investigated. A four-stroke, direct injected, single cylinder, diesel engine was tested at constant speed and at different load conditions without coating. Then, the inlet and exhaust valves faces were coated by about 500µm with ceramic materials. Ceramic layers were made of YttriaStabilized Zirconia (YSZ), and NiCrAl as a bond coat. The coating technique adapted in this work is the flame spray method. The engine with valves ceramiccoated research was tested for the same operation conditions of the engine (without coating). The results indicate a reduction in both fuel consumption by about 7.6% and particulate emissions by about (13

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
An Experimental Study of Compaction and Strength of Stabilized Cohesive Soil by Stone Powder
...Show More Authors

The In this experimental study, natural stone powder was utilized to improve a cohesive soil’s compaction and strength properties. According to the significant availability of limestone in the globe, it has been chosen for the purpose of the study, in addition to considering the existing rock industry massive waste. Stone powder was used in percentages of 4, 8, 12, 16% replaced from the soil weight in dry state. Some of cohesive soil’s consistency, shear, and compaction properties were depicted after improvement. The outcomes yielded in significant amendments in the experimented geotechnical properties after stone powder addition considering 60 days curing period. Cohesion and friction angle were notably increased by

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Openness and the Degree of Impact on Engagement Learner Department of Architecture Case Study
...Show More Authors

        This paper concerns with openness concept in contemporary learning environment, which ranges from physical characters to its relation with learning efficiency and its output. Previous literatures differ to clear the effect of openness on the engagement between learner within themselves, and with this kind of spaces. Engagement means: active participation, the ability of making dialogue, self-reflection and the ability to explore and communicate with them and
within learning space. Research roblem was: The lack of knowledge about the effect of Openness on learner engagement with learning spaces. The two concepts were applied on three types of learning spaces in the Department of the Architectu

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology &amp; Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref