Preferred Language
Articles
/
A0KZuJsBMeyNPGM3peCA
Spectrophotometric determination of Cisapride Based on ion-pair complex formation with Bromophenol blue
...Show More Authors

A new simple, sensitive and inexpensive method has been developed for the spectrophotometric determination of cisapride in pharmaceutical formulation. The turbidimetric method is based on the formation of the ion-pair complex between the drug and bromophenol blue (BPB) in presence of potassium chloride at pH= 2.6, with a maximum absorbance at 520 nm. The calibration graph is linear in the concentration range 5-50µg.ml-1 , with good correlation coefficient (r = 0.9989).The limit of detection was found to be 1.14 µg.ml-1 and no interference was observed from common excipients in the pharmaceutical preparation that contain cisapride with good accuracy and precision.

Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 03 2021
Journal Name
021 8th International Conference On Computing For Sustainable Global Development (indiacom)
Tilting-rotors Quadcopters: A New Dynamics Modelling and Simulation based on the Newton-Euler Method with Lead Compensator Control
...Show More Authors

Scopus (18)
Scopus
Publication Date
Thu Apr 01 2021
Journal Name
Complexity
Bayesian Regularized Neural Network Model Development for Predicting Daily Rainfall from Sea Level Pressure Data: Investigation on Solving Complex Hydrology Problem
...Show More Authors

Prediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay

... Show More
View Publication
Scopus (20)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Mon Aug 05 2024
Journal Name
Food And Bioprocess Technology
Development of an Innovative Reinforced Food Packaging Film Based on Corn Starch/Hydroxypropyl Methylcellulose/Nanocrystalline Cellulose Incorporated with Nanogel Containing Quercetin
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Uranium and Plutonium Recovery by Tributylphosphate Solvation and Trioctylamine Ion association Mechanisms
...Show More Authors

In this work a flowsheet has been put for the recovery of uranium and plutonium from 2.5M nitric acid solutions using 17.5% tributyl phosphate (TBP) and 2.5% trioctylamine (TOA) in kerosene diluent . The fission products (resulting from irradiated of uranium samples in nuclear research reactor) were removed from the desired actinides U & Pu .The organic phase TBP/TOA/Kerosene, containing both actinides U&Pu were stripped using 0.1 M HNO3. Trioctylamine (2.5 volume ratio ) in mesitylene , has been used in conditions appropriate for the recovery of Pu . From the experiments done using mixer- settler , the concentration of uranium in the organic phase in such conditions was very low ,not exceeding parts of a million .

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 31 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Ion Released from Two Brands of Brackets in Three Types of Mouthwashes
...Show More Authors

Background: Mouthwashes used widely as ancillary to mechanical oral hygiene methods. Little information provided about the effect of mouthwashes on ions released from orthodontic brackets. Therefore, the present study has been established to evaluate the effect of different mouthwashes on the corrosion resistance and the biocompatibility of two brands of brackets. Materials and Methods: Eighty premolar stainless steel brackets were used (40 brackets from each brand). They were subdivided into four subgroups (n=10) according to immersion media (deionized distilled water, Corsodyl, Listerine and Silca herb mouthwashes). Each bracket was stored in a closely packed glass tube filled with 15ml of the immersion media and incubated for 45 days at

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More