Preferred Language
Articles
/
bsj-2584
Synthesis And Characterization Of Some New Acetylenic Mannich Bases Based On Biphenyl – 4,4 - Dithiol
...Show More Authors

One of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Heavy Metal Complexes of 1, 2, 3-Triazole derivative: Synthesis, Characterization, and Cytotoxicity Appraisal Against Breast Cancer Cell Lines (MDA-MB-231)
...Show More Authors

     New chelating ligand derived from triazole and its complexes with metal ions Rhodium, Platinum and Gold were synthesized. Through a copper (I)-catalyzed click reaction, the ligand produced 1,3-dipolar cycloaddition between 2,6-bis((prop-2-yn-1-yloxy) methyl) pyridine and 1-azidododecane. All structures of these new compounds were rigorously characterized in the solid state using spectroscopic techniques like: 1HNMR, 13CNMR, Uv-Vis, FTIR, metal and elemental analyses, magnetic susceptibility and conductivity measurements at room temperature, it was found that the ligand acts as a penta and tetradentate chelate through N3O2, N2O2, and the geometry of the new complexes are identified as octahedral for (Rh & Pt) complexes a

... Show More
Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
New Schiff Base Derived From Folic Acid and 3Aminoacetophenone and its Metal Complexes with Some Transition Metals and Evaluation of Their Biological Activity
...Show More Authors

The ligand [Potassium (E)-(4-(((2-((1-(3-aminophenyl) ethylidene) amino)-4-oxo-1, 4-dihydropteridin-6-yl) methyl) amino) benzoyl)-L-glutamate] was prepared from the condensation reaction of folic acid with (3-aminoacetophenone) through Schiff reaction to give a new Schiff base ligand [H2L]. The ligand [H2L] was characterized by elemental analysis CHN, atomic absorption (AA),(FT-IR),(UV-Vis), TLC, ES mass (for spectroscopes), molar conductance, and melting point. The new Schiff base ligand [H2L], reacts with Mn (II), Co (II), Ni (II), Cu (II), Cr (III) and Cd (II) metal ions and (2-aminophenol),(metal: derivative ligand: 2-aminophenol) to give a series of new mixed complexes in the general formula:-K3 [M2 (HL)(HA) 2],(where M= Mn (II) and Cd

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
مؤتمر النسوي الثالث / كلية العلوم للبنات
Synthesis , Characterization and study of Biological Activities of Mixed Ligand-Complexes of Saccharin and Trimethoprim with Ni(II),Co(II),Cu(II), Hg(II) and Cd(II)
...Show More Authors

Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Spectroscopic Study for Resonance Effects on the Carbonyl Double Bond Order in Urea Schiff Bases Which Contain Conjugated System
...Show More Authors

In this work we prepared some schiff bases by condensation urea and benzaldehyde or its derevative ( bromo benzaldehyde or hydroxy benzaldehyde ) as ( 1 : 1 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A1 , B1 , C1 , D1 , E1 , F1 , G1 ) and ( 1 : 2 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A2 , B2 , C2 , D2 , E1 , F2 , G2 ) . The prepared compounds identified spectroscopic by infrared spectroscopy FT-IR and Thin layer chromotography T.L.C . The force constant calculated from the wave number for the carbonyl stretching from FT-IR chart and by using the following equation K = 4?2C2?'2? The change in double bond order for carbonyl deteremined in according with some past re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
NEW RECORD OF SOME BIOLOGICAL ENEMIES OF CITRUS LEAFMINER Phyllocnistis citrella Stainton (Lepidoptera: Gracillaridae) IN IRAQ
...Show More Authors

An extensive survey of citrus leaf miner (CLM) , Phyllocnistis citrella Stainton parasites
and predators was conducted during 1998 and 1999 in citrus orchards and nursuries in
Baghdad, Diyala and Wasit .Five eulophid parasites were recorded for the first time on citrus
leaf miner larvae , prepupae and pupae viz. Cirrospilus sp, Pnigalio sp ., Ratzburgiola
incompleta , Tetrasticus sp. and, Neochrysocharis formosa . Parasitism rate was ranged from
15% to 63% Chrysopa carnea , Orius albidipennis , Amblyseius sp . Were observed as
predators on CLM .

View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref