Preferred Language
Articles
/
SRf52pMBVTCNdQwClOsI
Lab on-a-chip-based, an integrated microfluidic device lo-cost, rapid, and sensitive analysis of Augmentin
...Show More Authors

Microfluidic devices provide distinct benefits for developing effective drug assays and screening. The microfluidic platforms may provide a faster and less expensive alternative. Fluids are contained in devices with considerable micrometer-scale dimensions. Owing to this tight restriction, drug assay quantities are minute (milliliters to femtoliters). In this research, a microfluidic chip consisting of micro-channels carved on substrate materials built using an Acrylic (Polymethyl Methacrylate, PMMA) chip was designed using a Carbon Dioxide (CO2) laser machine. The CO2 parameters influence the chip’s width, depth, and roughness. To have a regular channel surface, and low roughness, the laser power (60 W), with scanning speed (250 m/s), allows us to obtain microchannels with a minimum diameter of width (450 µm), depth of the channels was 89.4 µm and( Arithmetic Average Roughness Ra=2.3), (Relative roughness, Ɛ=5%) surface roughness with high accuracy and good surface quality. The functionalized multiwalled carbon nanotubes (F-MWCNTs) were used to enhance the drug signal to detect tiny Augmentin concentrations. In this work, laser microfluidic sensors have high accuracy in Augmentin detection compared to the traditional method(UV-VIS) spectrophotometer with LOD equal to 250 nM, 1 µM respectively.

Scopus Crossref
View Publication
Publication Date
Sun Mar 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Quantitative Analysis of the Mixing of Three Solids Different in Density by an Air Fluidized Bed
...Show More Authors

Three cohesionless free flowing materials of different density were mixed in an air fluidized bed to study the mixing process by calculating performance of mixing index according to Rose equation (1959) and to study the effect of four variables (air velocity, mixing time, particle size of trace component and concentration of trace component) on the mixing index and as well as on mixing performance. It was found that mixing index increases with increasing the air velocity, mixing time and concentration of trace component until the optimum value. Mixing index depends on the magnitude of difference in particle size The first set of experiments (salt then sand then cast iron) give higher mixing index and better performance of mixing than the

... Show More
View Publication Preview PDF
Publication Date
Mon May 27 2024
Journal Name
Eureka: Physics And Engineering
Systematic development of an autonomous robotic car for fire-fighting based on the interactive design approach
...Show More Authors

Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
International Journal Of Drug Develo
Modifying effects of boswellia carteri on clarithromycine action: In vitro antibacterial study against common sensitive bacterial strains
...Show More Authors

Background:Plant-derived compounds have action alongside Gram-positive and Gram-negative bacteria and numerous compounds, inhibit efflux pumps and hence have become known as efflux pump inhibitors. Clarithromycin is a macrolide antibiotic used to treat pharyngitis, tonsillitis, acute maxillary sinusitis and acute bacterial exacerbation of chronic bronchitis the antibacterial range is the similar as erythromycin but it is active against Mycobacterium avium complex, M.leprae and atypical mycobacteria. The in vitro antibacterial activity results of different boswellic acid compounds discovered alpha keto-boswellic acid (AKBA) to be the preponderance potent antibacterial compound alongside Gram-positive pathogens, but it showed no significant a

... Show More
Scopus (6)
Scopus
Publication Date
Wed Jan 10 2024
Journal Name
Journal Of Optics
Pulsed laser deposition of Pd/WO3 nanoparticles on Si nanostructure for highly sensitive room-temperature gas sensors
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref