Preferred Language
Articles
/
bsj-1464
Synthesis of New Pyrazoline - Phenoxathiin Derivatives
...Show More Authors

Phenoxathiin was prepared by the reaction of diphenyl ether with sulfur in the presence of anhydrous aluminum chloride. This work comprised the synthesis of new phenoxathiin derivatives containing heterocyclic moieties. These heterocyclic compounds were synthesized in three groups. The first group was made up of 2-(oxoalken-1-yl) phenoxathiin derivatives (3a-3j) obtained from the reaction of 2-acetylphenoxathiin with different aromatic aldehyde in the presence of sodium hydroxide. The other two groups involved compounds produced from the reaction of (3a-3j) with hydrazine hydrate in acetic acid to get 2-(1-acetyl pyrazolin-3-yl) phenoxathiin derivatives (4a-4j), and phenyl hydrazine in the presence of piperidine to afford 2-(1-phenyl pyrazolin-3-yl) phenoxathiin derivatives (5a-5j). All these compounds of two groups above were substituted in position (5) in pyrazoline ring with different aryl groups according to aromatic aldehyde used in the preparation of the first group series compounds.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Engineering And Applied Sciences
SYNTHESIS OF CIPROFLOXACIN LACTATE PROCAINAMIDE AS MUTUAL PRODRUG
...Show More Authors

In this research, two drugs were bonded through amide and ester attachment, using lactic acid as aspacer binder, produced di pro drug such as Procain and Ciprofloxacin. Since Procain has ailocail anesthetic action and Ciprofloxacin as antibacterial drug was reacted with lactic acid produced ester compound (1), then the carboxylic acid of lactic acid could reacted with free Procain oil produced amide attachment, the controlled drug release in different pH values at 37C˚was studied to improve their characteristic and to minimize the side effect of the drug could be used in broad spectrum activity as atherapeutic material.This mutual prodrug was used with another biological active drug instead of single action. The prepared prodrug was charac

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Synthesis and Environmental Application of BiOI/BiOCl Composites
...Show More Authors

This work illustrates an enhanced visible light photocatalytic degradation of methyl orange dye (M.O.) by employing BiOI / BiOCl composites prepared under room temperature and without any organic precursors. Various experimental parameters have been studied, namely; composition of the composite, irradiation time and cell material. Composition D which implied 75% BiOI and 25% BiOCl has shown the highest bleaching of M.O. dye. This confirms the optimum photo-sensitization phenomenon for this composition in comparison to others. In the optimum photo-sensitized composite the electron of the conduction band reveals better reducing power and the hole of the valence band exhibits more oxidative power than those of pure BiOI electron and hole. Acco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Opicion
Assessing Students’ College of the Physical Education and Sport Sciences’ Level of Performance in English in Terms the New Prescribed Textbook “New Headway plus”
...Show More Authors

Publication Date
Sun Nov 01 2015
Journal Name
Our Dermatology Online/nasza Dermatologia Online
Microwave Thermotherapy: New treatment for cutaneous leishmaniasis.
...Show More Authors

KE Sharquie, SA Al-Mashhadani, AA Noaimi, WB Al-Zoubaidi, Our Dermatology Online/Nasza Dermatologia Online, 2015 - Cited by 10

View Publication
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The new aesthetic in contemporary world painting
...Show More Authors

The research tagged: the new aesthetic in contemporary world painting. The research contained five chapters. The first chapter dealt with the research problem and its importance. It dealt with the concept of the new aesthetic as a concept concerned with the topics of the mind, i.e. the most comprehensive and diverse topics. The New Aesthetic is an aesthetic and stylistic structure whose taste, aesthetic, artistic and emotional contribute to its structure with awareness of the context. The aim of the research is to identify the new aesthetic in contemporary world painting. As for the objective limits of the research, the researcher was interested in studying the new aesthetic, especially in abstract expressionism, pop art, opera, and conc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
New Combined Technique for Fingerprint Image Enhancement
...Show More Authors

This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF