This current study was built on creating four electrodes based on molecularly imprinted polymers (MIPs). As the template using Cefalexin (CFX), 1-vinyl imidazole (VIZ) and vinyl acetate (VA) as monomer, and N, N-methylene bis acrylamide (MBAA) as cross-linkers and benzoyl peroxide as the initiator, two MIPs were prepared. The same composition was used in non-impressed polymers (NIPs) preparation, but without the template (Cefalexin). For the membranes preparation, numerous plasticizers, such as tri-oly phosphate (TOP) and di-octyl phthalate (DOP), were used in the PVC matrix, slop, detection limit, lifetime, and linearity range of CFX-MIPs electrodes are characteristics studied. To describe the created MIP, scanning electron microscopy (SEM) was used to study the properties of the electrodes, the slope, the detection limit, and the life time and linearity range. The effect of PH and interference on the efficiency of the electrode MIP was also investigated. The study has shown that the molecularly imprinted electrodes have high sensitivity and responsiveness to cefalaxin. The DPV value was linearly dependence on the aspirin concentration and a linear curve was obtained within the range of (1×10−1 - 5×10-4) M of cefalaxin with correlation coefficients are about (0.9941, 0.9899, 0.9936 and 0.9837) with slops value of (-18.48, -18.84, -18.60 and -19.47) and the detection limit for all electrodes ranging from (6×10-1-9×10-1) M.In the selectivity measurements results that we obtained there's no interaction with the cefalexin drug on interfering cations (K+, Ca+2, Al+3) and certain pharmaceutical additives such as methylparaben, propylparaben and trisodium citrate. The preparation electrodes have been shown good response including testing pharmaceutical analysis.The strategy employed is easy and fast. CFX membranes also have a short reaction speed, excellent mechanical stability, are removable and quick to create.
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreThe penalized least square method is a popular method to deal with high dimensional data ,where the number of explanatory variables is large than the sample size . The properties of penalized least square method are given high prediction accuracy and making estimation and variables selection
At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreIn this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.
The method of estimating the distribution parameters for each device was the OLS method.
The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and acc
... Show MoreAfter the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Objective(s): To assess the practices of early childhood’s mothers regarding toilet training and to find out the relationship between mothers’ practices and their socio-demographic characteristics and their children’s demographic characteristics.
Methodology: A descriptive study is conducted at primary health care centers in Al-Rusafa District in Baghdad City for the period of September 19th 2020 to March 16th 2021. Non probability “convenient” sample of (225) early childhood’s mothers is selected. A questionnaire format is designed and composed of two parts: the first part includes mothers’ socio-demographic characteristics and their children and the second part includes structured close-ended questions to assess the p
Reliability has an important role in both the industrial and engineering applications. So the need for Reliability Tests appeared are series of tests a discover out of factors that appear through the test, knowledge limit of fit a specifics production addition for getting on goodness of production.
Therefore, the need for research to test for censor data from ( Type II ) for exponential distribution with one parameter and that test it’s (Reliability Growth) includes three curves are Idealized Growth curve estimation parameters and reliability with maximum likelihood method, Duane Growth curve takes estimation parameters and reliability with least squares method, Exponential Reliability Growth Cur
... Show MoreThe study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some
... Show More