Preferred Language
Articles
/
jmracpc-256
DETERMINATION OF CEFALAXIN IN PHARMACEUTICAL PREPARATION BYMOLECULARY IMPRENTED POLYMER IN PVC MATRIX MEMBRANE: DETERMINATION OF CEFALAXIN IN PHARMACEUTICAL PREPARATION BYMOLECULARY IMPRENTED POLYMER IN PVC MATRIX MEMBRANE
...Show More Authors

This current study was built on creating four electrodes based on molecularly imprinted polymers (MIPs). As the template using Cefalexin (CFX), 1-vinyl imidazole (VIZ) and vinyl acetate (VA) as monomer, and N, N-methylene bis acrylamide (MBAA) as cross-linkers and benzoyl peroxide as the initiator, two MIPs were prepared. The same composition was used in non-impressed polymers (NIPs) preparation, but without the template (Cefalexin). For the membranes preparation, numerous plasticizers, such as tri-oly phosphate (TOP) and di-octyl phthalate (DOP), were used in the PVC matrix, slop, detection limit, lifetime, and linearity range of CFX-MIPs electrodes are characteristics   studied.  To describe the created MIP, scanning electron microscopy (SEM) was used to study the properties of the electrodes, the slope, the detection limit, and the life time and linearity range. The effect of PH and interference on the efficiency of the electrode MIP was also investigated. The study has shown that the molecularly imprinted electrodes have high sensitivity and responsiveness to cefalaxin. The DPV value was linearly dependence on the aspirin concentration and a linear curve was obtained within the range of (1×10−1 - 5×10-4) M of cefalaxin with correlation coefficients are about (0.9941, 0.9899, 0.9936 and 0.9837) with slops value of (-18.48, -18.84, -18.60 and -19.47) and the detection limit for all electrodes ranging from (6×10-1-9×10-1) M.In the selectivity measurements results that we obtained there's no interaction with the cefalexin drug on interfering cations (K+, Ca+2, Al+3) and certain pharmaceutical additives such as methylparaben, propylparaben and trisodium citrate. The preparation electrodes have been shown good response including testing pharmaceutical analysis.The strategy employed is easy and fast. CFX membranes also have a short reaction speed, excellent mechanical stability, are removable and quick to create.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Finite Element Analysis for the Damaged Rotating Composite Blade
...Show More Authors

In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included.  The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Solving Mixed Volterra - Fredholm Integral Equation (MVFIE) by Designing Neural Network
...Show More Authors

       In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.

         

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
حول أسلوب تحليل التغاير المتعدد باستخدام تصميم قطع منشقة
...Show More Authors

Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.

By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.

We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.

There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.

Key Word: Analysis of variatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management skills and their reflection in the settlement of insurance compensation: Applied Study in National Insurance Company and Iraqi Insurance Company
...Show More Authors

The environment contemporary works for the insurance companies have seen a number of technological developments and changes rapidly in light of the intense competition in the insurance market, and this affects human behavior in the workplace, and to director in his work needs to be a set of managerial skills. so we find compensation activity in companies insurance needs a high managerial skills, so that compensation, director of the settlement procedure successfully. So research aims to test two hypotheses two major belongings variables search using some statistical methods to extract the results and interpretation and analysis (such as arithmetic mean, standard deviation, percentages, Alpha Cronbach's coefficient, Pearson correlation co

... Show More
View Publication
Crossref