Preferred Language
Articles
/
sRaJFosBVTCNdQwCXMdw
Synthesis, Antioxidant ability and Docking study for new 4, 4'-((2-(Aryl)-1H-benzo [d] imidazole-1, 3 (2H)-diyl) bis (methylene)) diphenol
...Show More Authors

New series of 4,4'-((2-(Aryl)-1H-benzo[d]imidazole1,3(2H)-diyl)bis(methylene))Diphenol(3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hydroxyl for the aryl attached position two for benzimidazole decrease the capability of interaction and give less bending and smaller docking score and there is inverse relationship between increasing hindrances around phenolic hydroxyl and DNA polymerase inhibition for these compounds.

Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 03 2026
Journal Name
Basra Studies Journal
Impact of Digital Sociology on Land Usage in New Cities
...Show More Authors

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jul 01 2003
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORDS OF SOME MITE SPECIES INHABITING SOIL IN BAGHDAD
...Show More Authors

The soil acari fauna of Citrus orchards of Baghdad in Jadiriya area was studied in a total
of forty-eight samples. Twenty-two species were recorded during the present study of which
eight species were first records to Iraq. The ordinal composition of the soil acari fauna was
predominantly Mesostigmata.
This fauna represents diverse trophic groups. The most abundant groups were the
predacious and the Microphytophagus, while the less abundant groups were the predacious/
Microphytophagus, Macrophytophagus, and Panaphytophagus. The most abundant and
frequent species were Rhizoglyphus sp. Tyrophagus putrescentiea (Scrank), Pachylaelaps
longisetis Halbt. and Stratiolaelaps miles Berl.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A new species of genus stachys L. (Lamiaceae) in Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The Victorian Society’s Fear of the New Woman in Bram
...Show More Authors

Nineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DESCRIPTION OF NEW SPECIES OF TERMITES (INSECTA, ISOPTERA) FROM IRAQ
...Show More Authors

Two specie's of terrnitls are described as new to science from Iraq Amitermes corpnlentus sp. n. and Anacanthotermes savvensis sp. n., with two figures.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (6)
Scopus
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Some New Fixed Point Theorems in Weak Partial Metric Spaces
...Show More Authors

The main objective of this work is to introduce and investigate fixed point (F. p) theorems for maps that satisfy contractive conditions in weak partial metric spaces (W.P.M.S), and give some new generalization of the fixed point theorems of Mathews and Heckmann. Our results extend, and unify a multitude of (F. p) theorems and generalize some results in (W.P.M.S). An example is given as an illustration of our results.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref