Preferred Language
Articles
/
3BdmZZABVTCNdQwCD4hQ
Developing and Validating a Spectrophotometric Method for Estimating Antifungal (Nystatin) in its Pure Form Pharmaceutical Formulation Using Tetrachloro-1,4 benzoquinone
...Show More Authors

The UV−VIS absorption spectroscopy technique was used to study the formation of a new complex of charge transfer (CT) between bioactive organic molecules as (Nystatin) containing both a π-electrons from a conjugated system and lone-pair of electrons (amine) with Tetrachloro-1,4 benzoquinone (TCBQ) as a π-acceptor in which the transferred electron goes into its vacant anti-bonding molecular orbitals. The Tyrian purple-colored complex formed was quantitatively measured at 544 nm. This complex shows obeying Beer's law within the concentration range of (10-90) μg.ml-1The stoichiometry of the formed complex between the (Nys.) and (TCBQ) was found 1:2 as evaluated by continuous variation (Job's method) and mole ratio method The value of molar absorptivity was calculated at 7038.2840 L.mol-1.cm-1, while Sandell’s sensitivity value was estimated to be 0.01315 μg.cm-2, while LOD and LOQ were found to be 0.5661and 1.71558 μg.ml-1, respectively. The Charge-Transfer complex association constant (KCT) value was evaluated using Benesi-Hildebrand equation and was found to be 3.00E+03 L.mol-1. This procedure was successfully involved in the analysis of pharmaceutical formulations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Multilayer Perceptron for analyzing satellite data
...Show More Authors

Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach

View Publication Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Social enhancement for the kindergarten teachers
...Show More Authors

          The she/teacher is considered one of the basics of the educational process for its essential role in education and teaching the kindergarten child, thus  its lack to construct social relations in side the kindergarten environment working in it regarded one of the shortcoming factors she is suffering from which should be manipulated, because it could effect its enthusiasm to work in the kindergarten according to what has mentioned, the researcher presents the following objective:-

 

  • Identifying level of social enhancement for the kindergarten teachers via the test of the following hypothesis:-

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Progress In Electromagnetics Research C
BANDWIDTH OPTIMISATION FOR SEMICONDUCTOR JUNCTION CIRCULATORS
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Path Planning Control for Mobile Robot
...Show More Authors

Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.

This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref