Preferred Language
Articles
/
bRfUFI4BVTCNdQwCxTHu
Study the Variables Affecting Formulation of Ethylcellulose-based Microsponges Loaded with Clobetasol
...Show More Authors

Clobetasol propionate (CP) is a super potent corticosteroid widely used to treat various skin disorders such as atopic dermatitis and psoriasis. However, its utility for topical application is hampered due to its common side effects, such as skin atrophy, steroidal acne, hypopigmentation, and allergic contact dermatitis. Microsponge is a unique three-dimensional microstructure particle with micro and nano-meters-wide cavities, which can encapsulate both hydrophilic and lipophilic drugs providing increased efficacy and safety. The aim of the current study is to prepare and optimize clobetasol-loaded microsponges. The emulsion solvent diffusion method is used for the preparation of ethylcellulose (EC)-based microsponges. The impact of various formulation variables on microsponge's properties includes; drug: polymer ratio, polyvinyl alcohol (PVA) quantities, the volume of external phase, and stirring rates investigated. The microsponges were characterized in terms of particle size, product yield, CP entrapment %, and in-vitro drug release behavior. The results report that increasing EC concentration led to a significant increase in particle size, with a decrease in product yield and drug entrapment %. Increasing stirring speed or external aqueous volume or PVA w/v % caused a non-significant decrease in production yield and CP entrapment % but showed a significant decrease, and increase in particle size, respectively. Finally, it was concluded that the ability to use ethylcellous as a Msg polymer matrix to prepare uniform, highly porous particles was confirmed by microscope observation and compatibility with CP.

Scopus Crossref
View Publication
Publication Date
Thu Nov 25 2021
Journal Name
Engineering And Technology Journal
Pentacene Based Organic Field Effect Transistor Using Different Gate Dielectric
...Show More Authors

This paper presents the electrical behavior of the top contact/ bottom gate of an organic field-effect transistor (OFET) utilizing Pentacene as a semiconductor layer with two distinctive gate dielectric materials Polyvinylpyrrolidone (PVP) and Zirconium oxide (ZrO2) were chosen. The influence of the monolayer and bilayer gates insulator on OFET performance was investigated. MATLAB software was used to simulate and determine the electrical characteristics of a device. The output and transfer characteristics were studied for ZrO2, PVP and ZrO2/PVP as an organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric ZrO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Modified Opposition Based Learning to Improve Harmony Search Variants Exploration
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Ieee Access
Low-Distortion MMSE Speech Enhancement Estimator Based on Laplacian Prior
...Show More Authors

View Publication
Scopus (42)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More