Preferred Language
Articles
/
JRgdbpcBVTCNdQwCeZhY
Preparation, diagnosis and testing of the biological ‎activity of new complexes of Schiff bases
...Show More Authors

‎ Sixteen new complexes with the general formula [M(L)2(H2O)2] were ‎prepared resulting from the reaction of the two new Schiff base ligands, which ‎are‏: -‏ L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one)‎ L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) ‎ ‎ With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, ‎mercury) and (tetravalent platinum).‎‏ ‏ ‎ Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-‎dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is ‎linked to the metal ions via the nitrogen atoms are the isomethene group and ‎the oxygen is the hydroxide group of the pyrazoline ring. The two prepared ‎ligands are distinguished by their ability to dissolve in organic solvents such as ‎alcohols, ether, acetone, chloroform, carbon tetrachloride and ethanol, and ‎their inability to dissolve in water. The prepared compounds were ‎characterized using infrared spectroscopy and spectroscopy nuclear magnetic ‎resonance, ultraviolet spectroscopy, micro-analysis of elements (C.H.N), ‎atomic absorption analysis, electrical conductivity of solutions of complexes at ‎a concentration of ‎‏1×10-3 ‏‎, the magnetic susceptibility of the complexes was ‎measured, and the effect of the solvent on the prepared compounds was ‎studied, and from the results of the measurements, the octahedral geometric ‎structure of the prepared complexes was proposed.. The inhibitory ability of ‎the prepared compounds was tested against two types of selected bacteria, ‎Staphylococcus aureus and Escherichia coli, and a type of fungus, Candida. ‎The results showed that the ability of the metal complexes to inhibit is higher ‎than the ligand‏.‏

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Information Sources and their Role in E-learning from Iraqi College Students’ Viewpoint
...Show More Authors

The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Serum Leptin levels in ovarian polycystic disease and its correlation to body weight
...Show More Authors

Background: Poly cystic ovary syndrome is a common disorder in women of reproductive age, it is associated with disturbance of reproductive, endocrine and metabolic functions. The pathophysiology of PCOS appears to be multifactorial and polygenic. Leptin seems to play an important role in pathophysiology of PCOS especially in women with BMI ≥25kg/m2. Objectives: To assess leptin level in both PCOS and healthy women and explore the relation to their body weight and body mass index. Patient and Methods: A total of 120 women were enrolled in this study, 60 women (50%) had PCOS (study group) and the reminder 60 women (50%) were healthy women and considered as control group. BMI was calculated first. Both groups were further sub

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
End-to-End Speaker Profiling Using 1D CNN Architectures and Filter Bank Initialization
...Show More Authors

The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Aug 10 2024
Journal Name
Full Text Book Of Istanbul Congress 7
NARRATIVE TECHNIQUES AND THEIR APPLICATIONS IN ANDALUSIAN MAQAMAT/ EID MAQAMAT AS AN EXAMPLE
...Show More Authors

View Publication
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Annals Of Parasitology
Artemisinin efficacy against old world Leishmania donovani: in vitro and ex vivo study
...Show More Authors

Visceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …

View Publication
Scopus (11)
Scopus
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Semantic relations in text and translation: Die semantischen Relationen im Text und Übersetzung
...Show More Authors

       Based on the German language department’s theoretical and practical aspects as well as educational programs, the present study discusses the semantic relations in text sentences and their role in the science of translation.  Through clarifying the semantic relationship between the text sentence and the methods used to express a news item, a situation or an occurrence and through the statement of the multiple theoretical semantic structures of the text’s construction and interrelation, a translator can easily translate a text into the target language.

        It is known that language learners face multiple difficulties in writing and creating an inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref