In the present study, silver nanoparticles (AgNPs) were prepared using an eco-friendly method synthesized in a single step biosynthetic using leaves aqueous extract of Piper nigrum, Ziziphus spina-christi, and Eucalyptus globulus act as a reducing and capping agents, as a function of volume ratio of aqueous extract(100ppm) to AgNO3 (0.001M), (1: 10, 2: 10, 3: 10). The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AgNPs showed surface Plasmon resonance centered at 443, 440, and 441 nm for sample prepared using extract Piper nigrum, Ziziphus spina-christi, and Eucalyptus respectively. The XRD pattern showed that the strong intense peaks indicate crystalline nature and face centered cubic structure of silver nanoparticles for all samples were prepared. The average crystallite size of the AgNPs was 20-45 nm. Morphology of the AgNPs were carried out using FESEM. Observations show that the AgNPs synthesized were spherical(Cluster) in shape. with diameters of 13 to 53 nm.
Objective: Schiff’s and Mannich bases of isatins are an important group of heterocyclic compounds which are of great importance in medicinal chemistry as antimicrobial agents. In the vision of these facts, new bis-Schiff bases and Mannich bases of isatins were synthesized. Methods: Three different bis-Schiff bases (3a-c) have been synthesized by reacting isatin, 5-fluoroisatin and 5-methoxy isatin with thiophene-2- carboxaldehyde using hydrazine hydrate to link between the carbonyl compounds, and then these bis- Schiff bases were condensed with two different secondary amines (piperidine and morpholine) separately, and formaldehyde to form the Mannich bases (4a-c and 5a-f), respectively. Results: The structures of the newly synthesized com
... Show MoreAn experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative and flowery growth in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three
... Show MoreDiabetic mellitus is one of the main risk factors of fungal infections because poor glycemic control is associated with a high level of glucose in blood and saliva which could be treated as nutrient to fungi. This study aimed to isolate and identification of pathogenic fungi from diabetic patient. 140 samples were taken from different places of human body from the national center of diabetic patients that related to Mustansiriyah University / college of medicine and Al-yarmuk Hospital in Baghdad. 84 sample (60%) tested positive to fungi and 56 sample (40%) tested negative to fungi. The most frequented fungi isolated have been chosen for molecular identification by PCR (Millerozyma farinosa and Candida orthopsilosis) using specific pri
... Show MoreThe paper presents an original method to make the geometric synthesis of the rotary cam and translated tappet with roll. Classical method uses to the geometric synthesis and the reduced tappet velocity, and in this mode the geometric classic method become a geometric and kinematic synthesis method. The new geometric synthesis method uses just the geometric parameters (without velocities), but one utilizes and a condition to realize at the tapped the velocities predicted by the tapped movement laws imposed by the cam profile. Then, it makes the dynamic analyze for the imposed cam profile, and one modify the cam profile geometric parameters to determine a good dynamic response (functionality). In this mode it realizes the dynamic synthesis
... Show MoreHeterocyclic systems, which are essential in medicinal chemistry due to their promising cytotoxic activity, are one of the most important families of organic molecules found in nature or produced in the laboratory. As a result of coupling N-(4-nitrophenyl)-3-oxo-butanamide (3) using thiourea, indole-3-carboxaldehyde, or piperonal, the pyrimidine derivatives (5a and 5b) were produced. Furthermore, pyrimidine 9 was synthesized by reacting thiophene-2-carboxaldehyde with ethyl cyanoacetate and urea with potassium carbonate as a catalyst. The chalcones 11a and 11b were synthesized by reacting equal molar quantities of 1-naphthaldehy
... Show MoreThe charge density distributions of 10 B nucleus are calculated using the
harmonic oscillator wave functions. Elastic and inelastic electron scattering
longitudinal form factors have been calculated for the similar parity states of 10B
nucleus where a core of 4He is assumed and the remaining particles are
distributed over 3/ 2 1p and 1/ 2 1p orbits which form the model space.
Core-polarization effects are taken into account. Core-polarization effects are
calculated by using Tassie model and gives good agreement with the measured
data.
The compound Fe0.5CoxMg0.95-xO where (x= 0.025, 0.05, 0.075, 0.1) was prepared via the sol-gel technique. The crystalline nature of magnesium oxide was studied by X-ray powder diffraction (XRD) analysis, and the size of the sample crystals, ranging between (16.91-19.62nm), increased, while the lattice constant within the band (0.5337-0.4738 nm) decreased with increasing the cobalt concentration. The morphology of the specimens was studied by scanning electron microscopy (SEM) which shows images forming spherical granules in addition to the presence of interconnected chips. The presence of the elements involved in the super
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More