Preferred Language
Articles
/
pxZAwIsBVTCNdQwCVts1
Synthesis of Some New Schiff Bases Starting from 2,2 Dimorpholinyl Acetic Acid and Evaluating the Biological activity
...Show More Authors

n this study new derivatives of Schiff bases (5-10) were synthesized from the new starting material 1 . Which has been synthesized by the reaction of (1 mol.) of dichloroacetic acid with two moles of morpholine, in the presence of potassium hydroxide, Ester derivatives 2 and 3 were synthesized by the reaction of 1 with methanol or ethanol respectively in the presence of sulphuric acid as catalyst . Compound 2 was also prepared from dimethylsulphate with high yield , 2 and 3 was used to synthesized 2,2-dimorpholinylacetohydrazide 4 via reaction with NH2NH2.H2O 80% .Imines (5-10) were synthesized via the reaction of 4 with appropriate aromatic aldehydes in the presence of G.A.A as a catalyst . Derivatives compounds (1-10) were identified by FT-IR and some of them by 1H-NMR and mass spectroscopy . The biological activity of new derivatives (5-10) was examined against two kinds of bacteria E. coli (G-), Staph. aureus (G+). Some of these compounds was found to be vital activity against the selected bacteria.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis of Acetylenic Derivatives of a Substituted 1, 3, 4-Thiadiazole as Antibacterial Agents
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Imam al - Karji replies to some Islamic groups In his book the jokes of the Koran
...Show More Authors

Imam al - Karji replies to some Islamic groups
In his book the jokes of the Koran

View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Purification and Characterization β - lactamase produce from local isolate Klebsiella pneumonia
...Show More Authors

Beta-lactamase was purified from local isolate Klebsiella pneumonia by several steps included precipitation with ammonium sulphate at 20-40% saturation, DEAE- ion exchange chromatography and gel filtration on Sephacryl S-200 column. The obtained purification fold and recovery were 32.66; 47.04% respectively. The characterization of the purified beta-lactamase showed that the molecular weight was about 4000 daltons as determined by gel filtration.Purified enzyme had an optimal pH of 7 for activity and an optimal stability between pH 6.5-7.5, results shows that the optimal temperature appear to be 35 ? C .During storage the enzyme retained 72% at -20 ? C and retained 25% of the activity at the same period at 4 ? C.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Plant Archives
New Irrigation Techniques for Precision Agriculture: A Review
...Show More Authors

Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us

... Show More
Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Harmonic Knife New Haemostatic Procedure In Thyroid Surgery
...Show More Authors

 

Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.

Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .

Type of the study: Cross-sectional study.

Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017  on 229  goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
International Journal Of Innovative Computing, Information And Control
ITTP: A new transport protocol for VoIP applications
...Show More Authors

View Publication
Scopus (14)
Scopus
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
New Viscosity Correlation for Different Iraqi Oil Fields
...Show More Authors

 

Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Sep 25 2020
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Tuberculosis versus COVID-19 Mortality: A New Evidence
...Show More Authors

BACKGROUND: Coronavirus current pandemic (COVID-19) is the striking subject worldwide hitting countries in an unexplained non-universal pattern. Bacillus Calmette–Guérin (BCG) vaccine was an adopted recent justification depending on its non-specific immune activation properties. Still the problem of post-vaccine short duration of protection needs to be solved. The same protective mechanism was identified in active or latent tuberculosis (TB). For each single patient of active TB, there are about nine cases of asymptomatic latent TB apparently normal individuals living within the community without restrictions carrying benefits of immune activation and involved in re-infection cycles in an excellent example of repeated immunity tr

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref