Two molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standar
... Show MoreAbstract: The international community now places significant emphasis on achieving zero carbon emissions, requiring both new researchers and experienced policymakers to prioritise this goal. This article examines the effects of carbon taxes, carbon cap and trade, renewable energy (RE) production and consumption, and economic growth (EG) on carbon emission reduction in the United States, Japan, Canada, and Australia. The study collected secondary data from the World Development Indicators (WDI) secondary source spanning the years 1991 to 2022. The study examines the relationship between variables using the cross-sectionally augmented autoregressive distributed lag (CS-ARDL) approach. The findings indicate that carbon taxes, carbon cap and tr
... Show MoreThis in vitro study evaluated the influence of chemomechanical caries removal solution on the surface topography of metal-ceramic feldspar porcelain (MAJOR ceramic) and All-ceramic feldspar porcelain (Vita Alpha) using light polarizing microscope. Forty specimens of MAJOR ceramic and forty specimens of Vita Alpha ceramic of (12mm diameter & 3mm height) were prepared .All specimens were polished with silicon polishing burs, cleaned, autoglazed and stored in 37°C before exposure to Carisolv. Thirty specimens of each material randomly exposed to Carisolv gel for 5, 10 and 20 minutes respectively, other ten specimens were not, to act as control group. All specimens were subjected to surface roughness test by profilometer and evalua
... Show MoreABSTRACT Background: resin cement type and intraoral temperature fluctuations may affect the fracture performance of successful zirconia restorations. To fill this gap, the purpose of this study is to evaluate and compare the influence of thermocycling on fracture resistance and mode of failure of monolithic zirconia crowns luted with Rely X™ U200 and BreezeTMself-adhesive resin cements as well as imply the effect of adding 2 % of polylysine (PLS) to these cements. Materials: 64 maxillary premolars were milled out of zirconia blocks using CAD/CAM milling system. They were divided into four groups (n = 16) according to the cement type. Four different resin cements were used (RelyXTMU200, Breeze™, RelyX™ U200 with 2 % PLS
... Show MoreFlexible pavements are subjected to three main distress types: fatigue crack, thermal crack, and permanent deformation. Under severe climate conditions, thermal cracking particularly contributes largely to a considerable scale of premature deterioration of pavement infrastructure worldwide. This challenge is especially relevant for Europe, as weather conditions vary significantly throughout the year. Hydrated lime (HL) has been recognized as an effective additive to improve the mechanical properties of asphalt concrete for pavement applications. Previous research has found that a replacement of conventional limestone dust filler using hydrated lime at 2.5% of the total weight of aggregates generated an optimum improvement in the mec
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.