Preferred Language
Articles
/
ABb1xYkBVTCNdQwCR41E
Spectrophotometric-Assisted Chemometric Method for the Simultaneous Analysis of Furosemide, Carbamazepine, Diazepam, and Carvedilol in Their Bulk and Marketed Formulation
...Show More Authors

Simultaneous determination of Furosemide, Carbamazepine, Diazepam, and Carvedilol in bulk and pharmaceutical formulation using the partial least squares regression (PLS-1 and PLS-2) is described in this study. The two methods were successfully applied to estimate the four drugs in their quaternary mixture using UV spectral data of 84synthetic mixtures in the range of 200-350nm with the intervals Δλ=0.5nm. The linear concentration range were 1-20 μg.mL-1 for all, with correlation coefficient (R2) and root mean squares error for the calibration (RMSE) for FURO, CARB, DIAZ, and CARV were 0.9996, 0.9998, 0.9997, 0.9997, and 0.1128, 0.1292, 0.1868,0.1562 respectively for PLS-1, and for PLS-2 were 0.9995, 0.9999, 0.9997, 0.9998, and 0.1127, 0.1205, 0.1691, and 0.1686 respectively. Satisfactory results were achieved with applying PLS-1 and PLS-2 in the determination of the cited drugs in their pharmaceutical formulations and a good agreement was found between the proposed methods.

Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 26 2022
Journal Name
Iraqi Journal Of Science
Gene Expression Analysis via Spatial Clustering and Evaluation Indexing
...Show More Authors

The density-based spatial clustering for applications with noise (DBSCAN) is one of the most popular applications of clustering in data mining, and it is used to identify useful patterns and interesting distributions in the underlying data. Aggregation methods for classifying nonlinear aggregated data. In particular, DNA methylations, gene expression. That show the differentially skewed by distance sites and grouped nonlinearly by cancer daisies and the change Situations for gene excretion on it. Under these conditions, DBSCAN is expected to have a desirable clustering feature i that can be used to show the results of the changes. This research reviews the DBSCAN and compares its performance with other algorithms, such as the tradit

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The use of value chain analysis of information in determining the most important the accounting information
...Show More Authors

The use  analysis  value chain such  information in the provision as financial  so information quality meet and satisfy the needs of users such information , particularly investors and lenders   as the identification needs   financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances   theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Accurate Four-Step Hybrid Block Method for Solving Higher-Order Initial Value Problems
...Show More Authors

This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref