Preferred Language
Articles
/
XxfzV5IBVTCNdQwCHqzY
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 30 2025
Journal Name
Studia Universitatis Babeș-bolyai Chemia
GREEN SPECTROPHOTOMETRIC METHOD FOR CONCURRENT ESTIMATION OF PIROXICAM AND MEFENAMIC ACID MIXTURE
...Show More Authors

The purpose of this work is to concurrently estimate the UVvisible spectra of binary combinations of piroxicam and mefenamic acid using the chemometric approach. To create the model, spectral data from 73 samples (with wavelengths between 200 and 400 nm) were employed. A two-layer artificial neural network model was created, with two neurons in the output layer and fourteen neurons in the hidden layer. The model was trained to simulate the concentrations and spectra of piroxicam and mefenamic acid. For piroxicam and mefenamic acid, respectively, the Levenberg-Marquardt algorithm with feed-forward back-propagation learning produced root mean square errors of prediction of 0.1679 μg/mL and 0.1154 μg/mL, with coefficients of determination of

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Studia Universitatis Babeș-bolyai Chemia
GREEN SPECTROPHOTOMETRIC METHOD FOR CONCURRENT ESTIMATION OF PIROXICAM AND MEFENAMIC ACID MIXTURE
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Spectrophotometric Method for the Estimation of Ceftriaxone in Pure Form and Pharmaceuticals
...Show More Authors

Ceftriaxone sodium were one of the widely antibacterial drugs used. Azo dye derivatization of diazonium salt that formed via the reaction between ceftriaxone with hydrochloric acid and sodium nitrite was developed for the on-research drug analysis then coupling with each one 2,5-dimethylphenol (2,5-DMP) and 4-tertbutylphenol (4-TBP) respectively in the alkaline media. The developed diazonium coupling methods include an optimization study. The results show a limit of detection and limit of quantification 0.482, 0.284 µg/mL, and 1.607, 0.945 µg/mL using 2,5-DMP and 4-TBP reagents respectively. Moreover, the recovery % obtained was 100.89%, and 103.37% at linear concentration range 3.0 – 50, and 10 – 30 µg/mL, with mo

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (2)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
International Journal Of Medicine And Pharmaceutical Sciences (ijmps)
YIELDS CALCULATIONS FOR POSITRON EMISSION TOMOGRAPHY (PET) FOR NON-STANDARD RADIONUCLIDE
...Show More Authors

The PET scans provide images that pinpoint the anatomic location of abnormal metabolic activity within the body. A radionuclide suitable for labeling a wide range of radiopharmaceuticals for positron emission tomography imaging is used also for local therapy of tumors. Among the possible methods for cyclotron production of radionuclide used in PET. We investigate the proton irradiation to produce the standard radionuclide (15O, 11C,1 3N, 18F) and some non-standard Radionuclide (76Br,124I,60Cu,66Ga,86Y and 89Zr). The total integral yield based on the main published and approved experimental results of excitation functions were calculated.

Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Mon May 01 2017
Journal Name
2017 Ieee International Conference On Electro Information Technology (eit)
A high-performance non-isolated DC-DC buck converter design based on wide bandgap power devices
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
2010 Fourth Asia International Conference On Mathematical/analytical Modelling And Computer Simulation
Interaction Testing: From Pairwise to Variable Strength Interaction
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Food Process Engineering
Artificial intelligence‐based modeling of novel non‐thermal milk pasteurization to achieve desirable color and predict quality parameters during storage
...Show More Authors
Abstract<sec><label></label><p>This study proposed using color components as artificial intelligence (AI) input to predict milk moisture and fat contents. In this sense, an adaptive neuro‐fuzzy inference system (ANFIS) was applied to milk processed by moderate electrical field‐based non‐thermal (NP) and conventional pasteurization (CP). The differences between predicted and experimental data were not significant (<italic>p</italic> > 0.05) for lightness (<italic>L</italic>*), redness‐greenness (<italic>a</italic>*), yellowness‐blueness (<italic>b</italic>*), total color differences (∆<italic>E</italic>), hue angle (<italic>h</italic></p></sec> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref