Preferred Language
Articles
/
vhbCOokBVTCNdQwCmoa8
Preparation, Characterization, Antioxidant and Antibacterial Studies of New Metal (II) Complexes with Schiff Base for 3-amino-1-phenyl-2- pyrazoline-5-one
...Show More Authors

A new ligand complexes have been synthesis from reaction of metal ions of Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II) and Pt(II) with schiff base LH. 5-[(2-Hydroxy-naphthalen-1-ylmethylene)-amino]-2-phenyl-2,4-dihydro-pyrazol-3-one, this ligand was characterized by Fourier transform infrared (FTIR), UV-vis, 1H, 13CNMR, and mass spectra. All complexes were characterized by techniques micro analysis C.H.N, UV-vis and FTIR spectral studies, atomic absorption, chloride content, molar conductivity measurements and magnetic susceptibility. The ligand acts as bidentate, coordination through nitrogen atom from azomethin group and deprotonated phenolic oxygen atom. The spectroscopic and analytical measurements showed that the geometric shape of the prepared complexes is octahedral, while the square planar of the palladium and platinum complexes. The ligand and its complexes were having been screened for their antimicrobial activities and antioxidant

View Publication
Publication Date
Fri Apr 22 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Developing models to predicting the effect of crises on construction projects using MLR technique
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
International Journal Of Scientific Research
Anatomical differences of Cerebellar vermismeasurement values in healthy adult men andwomen using MRI images
...Show More Authors

Background: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Caspian Journal Of Environmental Sciences
DNA-damage in blood of welders occupationally exposed to welding fume using comet assay
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Cancer And Medical Genetics
Cytotoxicity of purified methionine γ- lyase produced by Pseudomonas putida on several cell lines
...Show More Authors

The cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).

Publication Date
Mon Sep 23 2019
Journal Name
Civil Engineering Journal
Energy Absorption Evaluation of CFRP-Strengthened Two-Spans Reinforced Concrete Beams under Pure Torsion
...Show More Authors

For more than a decade, externally bonded carbon fiber reinforced polymer (CFRP) composites successfully utilized in retrofitting reinforced concrete structural elements. The function of CFRP reinforcement in increasing the ductility of reinforced concrete (RC) beam is essential in such members. Flexural and shear behaviors, ductility, and confinement were the main studied properties that used the CFRP as a strengthening material. However, limited attention has been paid to investigate the energy absorption of torsion strengthening of concrete members, especially two-span concrete beams. Hence, the target of this work is to investigate the effectiveness of CFRP-strengthening technique with regard to energy absorption of two-span RC

... Show More
View Publication
Scopus (25)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Dec 11 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Mobile application to develop nurses’ knowledge of pediatric cardiopulmonary resuscitation: A quasi-experimental study
...Show More Authors

Background: Traditional teaching methods of cardiopulmonary resuscitation (CPR) are not effective for most learners today. They may lead to lack of retention of survival skills and poor outcomes. Various methods are adopted to provide optimal, effective, and attractive teaching methods. Application (app)-based teaching can be used as an alternative way for learners to develop their knowledge and skills. Despite the large number of professional and nonprofessional trainee members, the high quality of CPR is still not fulfilled. Technology-based learning can prove to be an effective way to teach medical subjects such as pediatric cardiac resuscitation, which require an optimal teaching environ

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Towards Sustainable Local Tourism to Conserve the Natural Environment: Foundations of Sustainable Ecolodge Design
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 06 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of tooth shape ratio on mandibular incisors arrangement in Iraqi adult subjects
...Show More Authors

Background: This study aimed to assess the effect of tooth shape ratio on mandibular incisor arrangement. Materials and methods: The sample included dental casts of some dental students and orthodontic patients having Class I dental and skeletal patterns with normal occlusion and severe crowding. The sample was divided into two groups according to the severity of crowding into: group I had Class I normal occlusion with mild or no crowded mandibular dentition and group II had Class I malocclusion with severe crowded mandibular dentition. Each group comprising of 40 subjects (20 males and 20 females). The mesio-distal and facio-lingual crown diameters were measured manually for each cast using modified vernier caliper gauge. Descriptive sta

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 30 2025
Journal Name
Journal Of International Studies
RESHAPING THE WORLD, RETHINKING ACTORS: THE ROLE OF SUB-STATE ACTORS IN FOREIGN RELATIONS
...Show More Authors

International relations scholars have increasingly debated the evolving landscape of actors that challenge the traditional state-centric world order. A key element of this transformation is the rise of sub-state actors, which engages in alternative diplomacy parallel to the state, transcending traditional state-centric frameworks. This paper explores the significant shifts in international actorness over the late 20th century, focusing on the emergence and implications of sub-state diplomacy, or "paradiplomacy." First, the study introduces sub-state actors and their role in challenging the dominant state-centric discourse. It then examines the dynamic evolution of paradiplomacy, highlighting how sub-states have expanded their global

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref