Preferred Language
Articles
/
xBasxIsBVTCNdQwCbN14
PREPARATION, CHARACTERIZATION, SPECTROPHOTOMETRIC DETERMINATION OF THE FORMULA OF ACOORDINATION COMPLEX AND BIOLOGICAL STUDIES OF SULFAMETHOXAZOLE (ANTIBIOTIC) WITH TIN DICHLORIDE
...Show More Authors

Sn(II) complex of the type, [Sn(SMZ)2]Cl2 was synthesized by the interaction of Sulfamethoxazole ligand and Tin Chloride, the complex was confirmed on the basis of results of elemental analyses, FT-IR, UV-Vis, molar conductance (Ëm). The elemental analysis data, suggests the stoichiometry to be 1:2 (metal: ligand) and determination of the formula of a coordination a complex formed between the Sn(II) ion and the SMZ using Job’s method of continuous variations. The study of (Ëm), indicated the electrolytic nature type 1:2. The [Sn(SMZ)2]Cl2 was screened for antibacterial activity against Gram-ve (Escherichia coli and Gram+ve (Staphylococcus aureus) and (Candida albicans) antifungal. The IR spectral data suggested that the coordination sites of SMZ are the sulfonyl oxygen and SO2-NH sulfonamide nitrogen as a bidentate ligand.

Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 28 2022
Journal Name
Nurse Media Journal Of Nursing
Health Literacy-Related Knowledge and Experience among Nurses Practicing in Medical-Surgical Wards
...Show More Authors

Background: Medical-surgical nurses are responsible of providing competent care to clients with a wide-array of acute and chronic health problems. This challenging task requires arming nurses with advanced competencies of health literacy to effectively educate their clients. However, evidence about medical-surgical nurse’s health literacy-related knowledge and experience is limited.  Purposes: This study aimed to determine the level of the health literacy-related knowledge and experience among medical-surgical nurses.Design: A descriptive-cross-sectional study was conducted among a total sample of 177 nurses who were practicing in medical-surgical wards in teaching hospitals in Iraq. A convenience sampling method was used to sele

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Consistency and Consistency in Contemporary Iraqi Painting - Selected Models-: حسين شاكر قاسم العيداني
...Show More Authors

  The tagged research is concerned with observation and investigating the concepts of consistency and harmony in contemporary Iraqi painting (selected models) in order to reveal the mechanisms and rules of these two concepts in the artistic field and their mechanisms of operation. How reflected tools Consistency and harmony in contemporary Iraqi painting? What is consistency and what are its mechanisms and principles? Is consistency a unit product quality? Are there similarities between consistency and harmony? What is harmony and its principles and rules? As for the second chapter, it included two topics that dealt with the first topic - consistency and harmony between concept and significance, while the second topic meant - histor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Knowledge, Attitudes and Barriers Towards Breast Cancer Health Education Among Iraqi Community Pharmacists
...Show More Authors

With the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing reinforced Concrete Girders Using External Post-Tensioning
...Show More Authors

Publication Date
Tue Feb 04 2025
Journal Name
Journal Of Communicable Diseases
Correlation between MicroRNA-155 Expression and Viral Load in Severe COVID-19 Patients
...Show More Authors

Background: The SARS-CoV-2 virus causes COVID-19, a respiratory syndrome. It causes inflammation and damages several organs in the body. miRNAs play a role in regulating the infection resulting from SARS-CoV-2. MicroRNA-155, a kind of microRNA linked to viral defences, can affect the immune responses during COVID-19. Objectives: Examination of the involvement of microRNA-155 in the development and severity of COVID-19, as well as finding the correlation between microRNA-155 and viral load (copies/mL) in severe cases of the disease. Materials and Method: A case-control research study was performed between October 2022 and June 2023. It included a cohort of 120 hospitalised individuals with severe cases of COVID-19, together with 115 individu

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref