Preferred Language
Articles
/
bsj-2791
A novel online coupling of ion selective electrode with the flow injection system for the determination of vitamin B1
...Show More Authors

A simple, fast, selective of a new flow injection analysis method coupled with potentiometric detection was used to determine vitamin B1 in pharmaceutical formulations via the prepared new selective membranes. Two electrodes were constructed for the determination of vitamin B1 based on the ion-pair vitamin B1-phosphotungestic acid (B1-PTA) in a poly (vinyl chloride) supported with a plasticized di-butyl phthalate (DBPH) and di-butyl phosphate (DBP). Applications of these ion selective electrodes for the determination of vitamin B1 in the pharmaceutical preparations for batch and flow injection systems were described. The ion selective membrane exhibited a near-Nernstian slope values 56.88 and 58.53 mV / decade, with the linear dynamic range of vitamin B1 was 5 x 10-5- 1 x 10-2 and 1 x 10-4-1 x 10-2 mol.L-1, in batch and FIA, respectively. The limit of detection was 3.5 x 10-5 and 9.5 x 10-5 mol.L-1, with the percentage linearity 98.85 and 95.22 in batch and FIA, respectively. The suggested ion selective electrode has been utilized perfection in the determination of vitamin B1 in pharmaceutical formulations using batch and flow injection system, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Computer Methods And Programs In Biomedicine
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

View Publication
Scopus (40)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Comparative Study for the Accuracy of Three Molecular Docking Programs Using HIV-1 Protease Inhibitors as a Model
...Show More Authors

Flexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Spectroscopic study of dielectric barrier discharge argon plasma at different gas flow rates
...Show More Authors

Dielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Electronic payment methods used for salary resettlement and its impact on improving the mental image of customers: an applied study of the opinions of a sample of (private) commercial banks 'customers contracting with the Ministry of Higher Education and Scientific Research to localize employees' salaries
...Show More Authors

The research seeks to identify the contemporary events that face the use of electronic payment methods to localize the salaries of state employees and its impact in enhancing the mental image of customers, and to achieve this purpose from the fact that a questionnaire was designed and distributed to an optional sample of (31) individual customers (employees) dealing With the researched private banks, it has been analyzed and reached a number of conclusions and recommendations, the most prominent of which is the lack of modernity of electronic payment methods by customers, which is reflected in the mental image of customers and the achievement of their satisfaction, in the Emiratization project for salaries needs an advanced leade

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 20 2011
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Chaos in a harvested prey-predator model with infectious disease in the prey
...Show More Authors

A harvested prey-predator model with infectious disease in preyis investigated. It is assumed that the predator feeds on the infected prey only according to Holling type-II functional response. The existence, uniqueness and boundedness of the solution of the model are investigated. The local stability analysis of the harvested prey-predator model is carried out. The necessary and sufficient conditions for the persistence of the model are also obtained. Finally, the global dynamics of this model is investigated analytically as well as numerically. It is observed that, the model have different types of dynamical behaviors including chaos.

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Heat Transfer
The indirect solar dryers with innovative solar air heaters designs: A review article
...Show More Authors
Abstract<p>The drying process is considered an effective technique for preserving foods and agricultural products from spoilage. Moreover, the drying process lessens the products' weight, volume, and packaging, which prompts a reduction in the products' transportation costs. The drying technique with solar energy represents an ancient method, still alluring due to solar energy abundance and cost‐effectiveness. In this article, the previous manuscripts concerned with studying and analyzing indirect solar dryer systems that utilize innovative solar air heaters (SAHs) are reviewed. The results and conclusions are discussed intensively to clarify the significance of utilizing this type of drying technique. The ef</p> ... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref