Preferred Language
Articles
/
KBd_P48BVTCNdQwC0mYJ
Light scattering detector based on light-emitting diodes-Solar cells for a flow analysis of Warfarin in pure form and pharmaceutical formulations
...Show More Authors
Abstract<p>Continuous turbidimetric analysis (CTA) for a distinctive analytical application by employing a homemade analyser (NAG Dual & Solo 0-180°) which contained two consecutive detection zones (measuring cells 1 & 2) is described. The analyser works based on light-emitting diodes as a light source and a set of solar cells as a light detector for turbidity measurements without needing further fibres or lenses. Formation of a turbid precipitated product with yellow colour due to the reaction between the warfarin and the precipitation reagent (Potassium dichromate) is what the developed method is based on. The CTA method was applied to determine the warfarin in pure form and pharmaceutical formulations in the concentration range from 2.0-16& 0.7-16 mmol/L with 0.58 and 0.55 mmol/L of the limit of detections. The correlation coefficients (r) of the developed method were 0.9977 and 0.9981 for cell 1 and 2 respectively. For validation of proposed method, the ICH guidelines were followed. The developed method was successfully applied for the determination of Warfarin in pure and pharmaceutical preparations. In addition, the method can be considered as a quality control method and conveniently used for routine analysis in laboratories since the method permits quantitatively determination of 60 samples/h.</p>
Scopus Crossref
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
Dual-Layer Compressive Sensing Scheme Incorporating Adaptive Cross Approximation Algorithm for Solving Monostatic Electromagnetic Scattering Problems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Effectiveness of Implication in New Formulations of the Contemporary Industrial Product: زياد حاتم حربي
...Show More Authors

  The current research aims at transforming the concept of implication from the rhetoric into the industrial design in order to have a new term (the design implication) in which the industrial designer takes all or part of another's design to imply his design in it and acknowledge that, and if he did not do so, it would be (design theft) parallel to the literary plagiarism.
In order to show the potentials of the industrial design in the production of new formulations of the industrial products forms, as the design is the carrier of language that addresses the recipients, it is possible to use the implication as a the tool of literature in the design and as a design strategy as it is one of the concepts that takes its course in e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
D.C electrical conductivity of prepared pure and doped polyaniline salt
...Show More Authors

Pure Polyaniline salt, and protonation PANI by H2SO4 were synthesized by electro-chemical oxidative polymerization of aniline with acidity of H2SO4. The solution was prepared in reaction temperature equal 291 K and the acidity of aqueous solution was 1 molarities. The prepared polyaniline was characterized by FT-IR, the result indicate that the intensity is increase with increasing of applied voltage. The dc conductivity has been measured for bulk polyaniline pure and doped in the form of compressed pellet with evaporated Ohmic Al electrodes in temperature range (303-423) K. The Eav energy of the thermal rate process of the electrical conductivity was determined. The results indicate that the dc conductivity of doped samples are two or t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of Engineering
Numerical Study of Fluid Flow and Heat Transfer Characteristics in Solid and Perforated Finned Heat Sinks Utilizing a Piezoelectric Fan
...Show More Authors

Numerical study is adapted to combine between piezoelectric fan as a turbulent air flow generator and perforated finned heat sinks. A single piezoelectric fan with different tip amplitudes placed eccentrically at the duct entrance. The problem of solid and perforated finned heat sinks is solved and analyzed numerically by using Ansys 17.2 fluent, and solving three dimensional energy and Navier–Stokes equations that set with RNG based k−ε scalable wall function turbulent model. Finite volume algorithm is used to solve both phases of solid and fluid. Calculations are done for three values of piezoelectric fan amplitudes 25 mm, 30 mm, and 40 mm, respectively. Results of this numerical study are compared with previous b

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF