Preferred Language
Articles
/
jmracpc-256
DETERMINATION OF CEFALAXIN IN PHARMACEUTICAL PREPARATION BYMOLECULARY IMPRENTED POLYMER IN PVC MATRIX MEMBRANE: DETERMINATION OF CEFALAXIN IN PHARMACEUTICAL PREPARATION BYMOLECULARY IMPRENTED POLYMER IN PVC MATRIX MEMBRANE
...Show More Authors

This current study was built on creating four electrodes based on molecularly imprinted polymers (MIPs). As the template using Cefalexin (CFX), 1-vinyl imidazole (VIZ) and vinyl acetate (VA) as monomer, and N, N-methylene bis acrylamide (MBAA) as cross-linkers and benzoyl peroxide as the initiator, two MIPs were prepared. The same composition was used in non-impressed polymers (NIPs) preparation, but without the template (Cefalexin). For the membranes preparation, numerous plasticizers, such as tri-oly phosphate (TOP) and di-octyl phthalate (DOP), were used in the PVC matrix, slop, detection limit, lifetime, and linearity range of CFX-MIPs electrodes are characteristics   studied.  To describe the created MIP, scanning electron microscopy (SEM) was used to study the properties of the electrodes, the slope, the detection limit, and the life time and linearity range. The effect of PH and interference on the efficiency of the electrode MIP was also investigated. The study has shown that the molecularly imprinted electrodes have high sensitivity and responsiveness to cefalaxin. The DPV value was linearly dependence on the aspirin concentration and a linear curve was obtained within the range of (1×10−1 - 5×10-4) M of cefalaxin with correlation coefficients are about (0.9941, 0.9899, 0.9936 and 0.9837) with slops value of (-18.48, -18.84, -18.60 and -19.47) and the detection limit for all electrodes ranging from (6×10-1-9×10-1) M.In the selectivity measurements results that we obtained there's no interaction with the cefalexin drug on interfering cations (K+, Ca+2, Al+3) and certain pharmaceutical additives such as methylparaben, propylparaben and trisodium citrate. The preparation electrodes have been shown good response including testing pharmaceutical analysis.The strategy employed is easy and fast. CFX membranes also have a short reaction speed, excellent mechanical stability, are removable and quick to create.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
A New Structure for Cascaded Single-Stage Distributed Amplifier Using Proposed Active Inductor Loads
...Show More Authors

A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.

View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Determine Optimal Preventive Maintenance Time Using Scheduling Method
...Show More Authors

In this paper, the reliability and scheduling of maintenance of some medical devices were estimated by one variable, the time variable (failure times) on the assumption that the time variable for all devices has the same distribution as (Weibull distribution.

The method of estimating the distribution parameters for each device was the OLS method.

The main objective of this research is to determine the optimal time for preventive maintenance of medical devices. Two methods were adopted to estimate the optimal time of preventive maintenance. The first method depends on the maintenance schedule by relying on information on the cost of maintenance and the cost of stopping work and acc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
COVID-19 Diagnosis System using SimpNet Deep Model
...Show More Authors

After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings

... Show More
View Publication Preview PDF
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Practices of Early Childhood’s Mothers Regarding Toilet Training at Primary Health Care Centers in Al-Rusafa District in Baghdad City
...Show More Authors

Objective(s): To assess the practices of early childhood’s mothers regarding toilet training and to find out the relationship between mothers’ practices and their socio-demographic characteristics and their children’s demographic characteristics.
Methodology: A descriptive study is conducted at primary health care centers in Al-Rusafa District in Baghdad City for the period of September 19th 2020 to March 16th 2021. Non probability “convenient” sample of (225) early childhood’s mothers is selected. A questionnaire format is designed and composed of two parts: the first part includes mothers’ socio-demographic characteristics and their children and the second part includes structured close-ended questions to assess the p

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة طرائق تقدير المعلمات والمعولية لانماذج الاختبارات المعجلة والنمو لبيانات المراقبة من النوع الثاني مع تطبيق عملي
...Show More Authors

Reliability has an important role in both the industrial and engineering applications. So the need for Reliability Tests appeared are series of tests a discover out of factors that  appear through the test, knowledge limit of fit a specifics production addition for getting on goodness of production.

Therefore, the need for research to test for censor data from ( Type II ) for exponential distribution with one parameter and that test it’s (Reliability Growth) includes three curves are Idealized Growth curve estimation parameters and reliability with maximum likelihood method, Duane Growth curve takes estimation parameters and reliability with least squares method, Exponential Reliability Growth Cur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
The Degree of Availability of Design Thinking Indicators in the content of Arabic Language Curricula at the secondary stage in Syrian Arab Republic
...Show More Authors

The study aimed to identify the degree of availability of design Thinking Indicators in The content of the Arabic Language Curricula at the secondary stage in the Syrian Arab Republic; to achieve the goal of the study. The researcher used the Descriptive Approach based on the analysis method according to the Cognitive Theory. The study tools consist of a list of Design Thinking Indicators and a Content Analysis Tool. The researcher completed the Validity and Reliability procedures for the tools. After applying them, the results of the study resulted in the following: Greater Interest than other sub-skills. The results also showed a Divergence of care for the sub-skills and the Difference in their recurrence rate, and the Omission of some

... Show More
View Publication Preview PDF
Crossref