Preferred Language
Articles
/
vRhxEZYBVTCNdQwCLIFA
Microwave synthesis, density functional theory study and antiproliferative activity of the novel spiropyrazole derivatives
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Al-nahrain University-science
Synthesis of Polyacrylamides from Derivatives 2-Aminobenzothiazole and also Preparation of Dibutylphthalate as a Plasticizer to Estimate Plasticization Behaviour for Prepared Polymers
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

View Publication
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Environmental Accounting And Management
On the Food Chain Model with Sokol Howell Functional Response and Prey Refuge
...Show More Authors

The cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.

Scopus (1)
Scopus Clarivate
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Synthesis of new five-membered hetrocyclic compounds from 2-furfuryl mercaptan derivative and evaluation of their biological activity
...Show More Authors

A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiomet

... Show More
Scopus (7)
Scopus
Publication Date
Wed Apr 01 2020
Journal Name
Biochemical & Cellular Archives
SYNTHESIS, CHARACTERIZATION, ANTIOXIDANT, ANTICANCER HUMAN STUDIES AND BIOLOGICAL ACTIVITY OF MIXED LIGAND COMPLEXES USING SCHIFF BASE LIGAND AND HISTIDINE.
...Show More Authors

الوصف Mixed ligand complexes of Cu (II), Co (II) and Zn (II) with 2-((4-(1-(4-chlorophenylimino) ethyl) phenylimino) methyl) phenol (L) and histidine (His) have been prepared and diagnosed by ¹H and13 C NMR, FT-IR and electronic spectral data, thermal gravimetric, molar conductance and metal analysis measurements. The ligand (L) shows a bidentate nature and the coordination occurs through N and O atoms of imine group and phenol group respectively whereas (His) behave as tridentate ligand, coordinating through the-NH2 group and carboxylate oxygen group and N atoms of imidazole ring. The analytical studies for three complexes have shown octahedral structure. The anticancer activity was screened against human cancer cell such Follicular

... Show More
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Representations of the ego and the other In the Iraqi feminist novel
...Show More Authors

The other is a problematic concept and can be achieved only by the existence of difference and differentiation between human groups in views and views, the other is out of the ego, which is different religiously, politically, socially, culturally, place and language.
We take from the Iraqi feminist novel analytical field to reflect the image of the other in the novelist world, and the models chosen for the study are: the novel granddaughter of American novelist Anaam Kjie Ji, and novel how the sky seemed close to the novelist Batoul al-Khudairi, and novel when you wake up the smell of novelist Dni Ghali, and the rope of the umbilical and the novel Shufuni Shufuni The novel by Samira Al-Manea, the novelist of the novelist Alia Mamdouh,

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Derivatives in reading behind bin Hisham al-Bazzar Morphological study
...Show More Authors

One of the main criteria taken by the reader in the correct reading of a statement is the standard morphological, Vabv Eetmisah from the rest of science that examines the word andchanges therein lead to new meanings, which is the rule months in Morphology, every increase in construction lead to an increase in meaning.
Who took behind with the likes of ten readers Morphology a way to show the most rightly reading, to perform the desired effect, it has committed as committed behind bin Hisham statement argument morphological under which the clear sense of the formula of distinguished from Matheladtha of formulas feature to perform their intended meaning. And here that God Almighty was meant to each formula is contained in verse without

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article Structural violence: A study In Johann Galtung's theory of explanation he violence t
...Show More Authors

This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Spectroscopic measurements of the electron temperature in low pressure microwave 2.45 GHz argon plasma
...Show More Authors

The main goal of this work is to obtain the plasma electron temperature Te by optical emission spectroscopy of low pressure microwave argon plasma, as a function of working pressure and microwave power. A plasma system was designed and constructed in our laboratory using a magnetron of domestic microwave oven with power 800W without any commercial part. The applied voltage on the magnetron electrical circuit is changed for the purpose of obtaining the variable values of the microwave power. The spectral detection is performed with a spectrometer of wavelength range (200−1000nm). The working pressure and magnetron applied voltage were 0.3-3.0mbar and 180-240V, respectively. Two methods had been applied to estimate the electron temperatu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref