Two molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standard drug solution and its response were stable at pH ranges from 1.0 to 11.0 and with good selectivity for more than several type. The electrodes produced have been successfully applied in preparation of the pharmaceutical sample for the determination of the analyte without any time consuming pretreatment steps.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThe impact of undergraduate research experiences on students' academic development and retention in STEM fields is significant. Students' success in STEM fields is based on developing strong research and critical thinking skills that make it essential for students to engage in research activities throughout their academic programs. This work evaluates the effectiveness of undergraduate research experiences with respect to its influence on student retention and academic development. The cases presented are based on years of experience implementing undergraduate research programs in various STEM fields at Colorado State University Pueblo (CSU Pueblo) funded by HSI STEM Grants. The study seeks to establish a correlation between students' reten
... Show MoreSome coordination complexes of Co(??), Ni(??), Cu(??), Cd(??) and Hg(??) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(??) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (??) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahedral st
... Show MoreSome coordination complexes of Co(??), Ni(??), Cu(??), Cd(??) and Hg(??) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(??) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (??) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahedral structures
... Show MoreSome coordination complexes of Co(ІІ), Ni(ІІ), Cu(ІІ), Cd(ІІ) and Hg(ІІ) are reacted in ethanol with Schiff base ligand derived from of 2,4,6- trihydroxybenzophenone and 3-aminophenol using microwave irradiation and then reacted with metal salts in ethanol as a solvent in 1:2 ratio (metal: ligand). The ligand [H4L] is characterized by FTIR, UV-Vis, C.H.N, 1H-NMR,13C-NMR, and mass spectra. The metal complexes are characterized by atomic absorption, infrared spectra, electronic spectra, molar conductance, (C.H.N for Ni(ІІ) complex) and magnetic moment measurements. These measurements indicate that the ligand coordinates with metal (ІІ) ion in a tridentate manner through the nitrogen and oxygen atoms of the ligand, octahed
... Show More