Preferred Language
Articles
/
tBinA5cBVTCNdQwCK5Rt
SYNTHESIS, SPECTRAL AND THERMAL CHARACTERIZATION OF NI(II), CU(II) AND ZN(II) COMPLEXES WITH NEW LIGAND TOWARDS POTENTIAL BIOLOGICAL APPLICATION
...Show More Authors

Series of new complexes of the type [M2 (L)Cl4 ] are prepared from the new ligand[N1 ,N4 -bis(benzo[d]thiazol-2- yl)succinamide (L) derived from ethan-1,2-dicarbonyl chloride and 2-aminobenzothiozole,where, M= Ni(ii), Cu(ii) and Zn(ii) alsocomplexes of mix-ligands, the type [M(L)(8-HQ)]Cl, where, M = Ni(ii), Cu(ii) and Zn(ii),8-HQ= 8-Hydroxyquinoline. Chemical forms are obtained from their 1 H, 13CNMR, Mass spectra (for (L)), FT-IR and U.V spectrum, melting point, molar conduct.Using flame (AA), % M is determined in the complexes.The content of C, H, N and S in the (L) and its complexes was specified. Magnetic susceptibility and thermal analysis (TGA) of prepared compounds were measured.The propose geometry for all complexes[M2 (L)Cl4 ] was tetrahedral while for [M(L)(8-HQ)]Cl was octahedral. By the weight loss method in a 0.1M H2 SO4 solution for mild steel,corrosion inhibition of the (L) was evaluated. Anti-bacterial activity of the (L) and theircomplexes was examined for two type of bacteria. TGA studies of ligand and nickel complex show multi-step decomposition pattern of their organic frameworks.

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Prevalence and Characterization of Some Colibactin Genes in Clinical Enterobacteriaceae isolates from Iraqi Patients
...Show More Authors

The members of the family of Eentrobacteriaceae harbour a gene cluster called polyketide synthase (pks) island. This cluster is responsible for the synthesis of the genotoxin colibactin that might have an important role in the induction of double-strand DNA breaks, leading to promote human colorectal cancer (CRC). Eleven out of the eighty eight isolates (12.5%) were pks+, distributed as 7 (8%) isolates of E. coli, 2 (2.25%) of K. pneumoniae and 2 (2.25%) of E. aerogenes. The cytotoxic effects of selected pks+ isolates (E. coli and E. aerogenes) on HeLa cells were represented by decreasing cell numbers and enlarged cell nuclei in comparison to the untreated cells. Cytological changes were observed when the infected HeLa cells culture

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 26 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Characterization of Montelukast Sodium ( SMLT ) as a Dual Sustained Release Buccal Strips
...Show More Authors

An oral bi layer  sustained release (SR) strips of Sodium  Montelukast SMLT , which is selective  leukotriene  antagonist  , used  for  patients  suffered from mid-night asthma , were prepared successfully ,using different polymers, like guar  gum , carrageenan , and xanthan gum , by solvent casting method .

The results obtained by this study revealed  ,that best  fast  dissolving  film of  SMLT was  loaded  in carrageenan   polymer 57%  w\w (30mg.) ,  with  acceptable  physical properties, like film thickness , elastic endurance and  surface pH  .

Besides  to that , the  disintegration  t

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Discrete Fracture Network and Fractured Reservoir Characterization in Khabaz Field-Tertiary Formation
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Future Teachers' Attitudes Towards Cloud Computing in the Kingdom of Saudi Arabia: Assistant Professor of Education Techniques, Department of Curriculum and Teaching Techniques Faculty of Education and Literature, Northern Border University Saudi Arabia
...Show More Authors

The research aims to identify the future teachers' attitudes toward cloud computing in the Kingdom of Saudi Arabia from their point of view. The research adopted the descriptive approach, and a questionnaire was applied to a random sample of (370) male and female teachers in governmental and private general education schools in the Al-Jouf region, Saudi Arabia. The results of the research concluded that the reality of future teachers' attitudes towards cloud computing in the Kingdom of Saudi Arabia from their point of view is very high and that most areas of using computing are in the field of assessment, then teaching, and activities. The challenges of future teachers' attitudes toward cloud computing are recorded at a high level, parti

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Thermal Degradation Kinetics of Polyamide 6,6 Cable Ties by Thermogravimetric Analysis
...Show More Authors

  The thermal degradation of cable ties of polyamide (PA6,6) neat and UV stabilized was investigated by thermogravimetry (TG) and its derivative (DTG) at several heating rates between 5 and 80 oC min-1  in helium atmosphere. High heating rates signal novel peaks in the DTG curves that indicate melting temperature of PA6,6. The kinetic parameters calculated via isoconversion and nonisothermal data using the Flynn-Wall-Ozawa, Kissinger and CoatsRedfern methods showed comparable activation energy values. Exposure of the ties to outdoor environment causes pre-mature stress cracking and brittle failure due to prevalence of crosslinking reaction occurring in the polymer chains

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Tue May 14 2024
Journal Name
European Journal Of Dentistry
The Potential Role of Reactive Oxygen Species Produced by Low-Density Neutrophils in Periodontitis
...Show More Authors
Abstract<p> Objective Neutrophils own an arsenal of dischargeable chemicals that enable them to handle bacterial challenges, manipulating innate immune response and actual participation in acquired immunity. The reactive oxygen species (ROS) are one of the most important chemicals that neutrophils discharge to eradicate pathogens. Despite their beneficial role, the ROS were strongly correlated to periodontal tissue destruction. Lowdensity neutrophils (LDN) have been recognized for producing enhanced quantities of ROS. However, the potential role of ROS produced by LDN in periodontitis is unknown. The aim of the study was to investigate the impact of ROS produced by LDN in periodontal diseases.</p> ... Show More
View Publication Preview PDF
Scopus Clarivate Crossref