Preferred Language
Articles
/
lxaRxIsBVTCNdQwCFN1H
Synthesis, characterization and liquid crystalline properties of novel benzimidazol-8-hydroxyquinoline complexes
...Show More Authors

The synthesis, characterization and liquid crystalline properties of N4,N40-bis((1 H-benzo[d]imidazol-2- yl)methyl)-3,30-dimethyl-[1,10-biphenyl]-4,40-diamine and of their corresponding Mn(II), Fe(II), Ni (II), Cu(II), and Zn(II) complexes are described. The ligand and complexes have been characterized by elemental analysis, magnetic susceptibility measurements (meff), conductometric measurements and Fourier Transform Infrared (FTIR), Nuclear Magnetic Resonance (1H NMR), (13C-NMR) and UV–Vis spectroscopy. Spectral investigations suggested octahedral coordination geometrical arrangement for M(II) complexes. The phase transition temperatures were detected by differential scanning calorimetry (DSC) analysis and the phases are confirmed by optical polarizing microscopy (POM). The DSC and POM supported the mesomorphic properties of the uncoordinated ligand in which the enantiotropic smectic phases were recorded. However, not all of their corresponding M(II) complexes are liquid crystal.

Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Aug 08 2024
Journal Name
New Materials, Compounds And Applications
MOLECULAR MODELLING AND THEORETICAL DESIGN OF NOVEL NIRMATRELVIR DERIVATIVES AS SARS-COV-2 ENTRY INHIBITORS
...Show More Authors

The pandemic SARS-CoV-2 is highly transmittable with its proliferation among nations. This study aims to design and exploring the efficacy of novel nirmatrelvir derivatives as SARS entry inhibitors by adapting a molecular modeling approach combined with theoretical design. The study focuses on the preparation of these derivatives and understanding their effectiveness, with a special focus on their binding affinity to the S protein, which is pivotal for the virus’s access to the host cell. Considering molecular docking aspects in the scope of a study on nirmatrelvir derivatives and S protein, dynamics simulations with 25 nanoseconds of their binding are explored. The study shows that these derivatives might work as effective antivi

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu May 13 2004
Journal Name
The College Of Arts/ Al-mustansiriyya University
The Linguistic Aspect of Euphemism in Jane Austen's Novel Emma: Motivation and Formation
...Show More Authors

APDBN Rashid, The College of Arts/ Al-Mustansiriyya University, 2004

View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
The Design and Simulation of a Novel Optical Adder Depending on Optical Tri-state Gates
...Show More Authors

Essential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Analytical Science & Technology
Metal complexes of alizarin and their biological and industrial applications: A literature review
...Show More Authors

Alizarin is one of the popularly used and wide separated compounds with a chemical name (1,2- dihydroxy-9,10-anthraquinone) which belong to the anthraquinones family that contain three aromatic conjugated rings and in the central rings it contains two ketonic groups.1

Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
Emotions conflict In Balzac’s novel The Father Goriot And Stendhal’s The Red and The Black
...Show More Authors

Au XIXe siècle, avec l’excès de la passion, le roman français commence à avoir de nouvelles figures. Il tend à être un reflet de la pensée et de la passion. Stendhal et Balzac révèlent ainsi le conflit de l’âme et donnent à leur héros l’impression que tout est permis.

                Ces protagonistes doivent, d’une part, subir des fluctuations psychologiques, et d’autre part, ces héros doivent être capables de faire face aux rancunes et aux conflits destructeurs. Les personnages stendhaliens et balzaciens finissent par croire que leur combat ne portera pas ses fruits, parce que toute passion déséquilibrée mènera, soit à la fol

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-adab Journal
The Iraqi countryside in a novel (Exceeded border)
...Show More Authors

The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta

... Show More
Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
2017 12th International Conference For Internet Technology And Secured Transactions (icitst)
A novel multimedia-forensic analysis tool (M-FAT)
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref