Preferred Language
Articles
/
bijps-1086
Synthesis and evaluation of B-cyclodextrin Based Nanosponges of 5- Fluorouracil by Using Ultrasound Assisted Method
...Show More Authors

 

CD-nanosponges were prepared by crosslinking B-CD with diphenylcarbonate (DPC) using ultrasound assisted technique. 5-FU was incorporated with NS by freeze drying, and the phase solubility study, complexation efficiency (CE) entrapment efficiency were performed. Also, the particle morphology was studied using SEM and AFM. The in-vitro release of 5-FU from the prepared nanosponges was carried out in 0.1N HCl.

5-FU nanosponges particle size was in the nano size. The optimum formula showed a particle size of (405.46±30) nm, with a polydispersity index (PDI) (0.328±0.002) and a negative zeta potential (-18.75±1.8). Also the drug entrapment efficiency varied with the CD: DPC molar ratio from 15.6 % to 30%. The SEM and AFM showed crystalline and porous nature of the nanosponges. The in vitro drug release study of the selected formula 5-FUNS2 exhibited the fastest dissolution rate which is 56% in the first hr.

Different molar ratios of (cyclodextrin to crosslinker) (CD: DPC) has a proficient effect on complexation efficiency (CE), apparent stability constant (Kst) and entrapment efficiency of 5-FU. 5-FUNS2 with (1:4) molar ratio showed the best result of CE, Kst and entrapment efficiency. 5-FUNS2 gave a higher release rate than the 5-FU-BCD inclusion complex and 5-FU solution. Surface morphology of the prepared nanosponges by SEM, AFM indicate that nanosized and highly porous nanosponges was obtained. The overall results suggest that cyclodextrin nanosponges could be a promising 5-FU delivery system utilizing the suitable formula.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Inverse Kinematics Analysis and Simulation of a 5 DOF Robotic Arm using MATLAB
...Show More Authors

Kinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Refractive Index Sensor Based on Micro- Structured Optical Fibers with Using Finite Element Method
...Show More Authors

In this paper a refractive index sensor based on micro-structured optical fiber has been proposed using Finite Element Method (FEM). The designed fiber has a hexagonal cladding structure with six air holes rings running around its solid core.  The air holes of fiber has been infiltrated  with different liquids such as water , ethanol, methanol, and toluene then sensor characteristics like ; effective refractive index , confinement loss, beam profile of the fundamental mode, and sensor resolution are investigated by employing the FEM. This designed sensor characterized by its low confinement loss and high resolution so a small change in the analyte refractive index could be detect which is could be useful to detect the change of

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (2)
Scopus
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Application of Mathematical 3D Surface Using Bi-cubic B-Spline Models
...Show More Authors

This paper describes a modified mathematical method that used for controlling and generating three dimensional surfaces based on different axes (X, Y, and Z) and free axis. The main aim of the proposed method is to allow the designer to change the shape of the surface to the desired one without changing the original data points which is presented in the earlier version of this paper under title "3D Surface Reconstruction of Mathematical Modelling Used for Controlling the Generation of Different Bi-cubic B-Spline in Matrix Form without Changing the Control Points". The proposed method has been done by changing the t and s, parameters value that are assigned secretly by the designer. Therefore, in case off the control points have been disc

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 22 2019
Journal Name
Spe
Evaluation of Gas and Downhole Water Sink-Assisted Gravity Drainage GDWS-AGD Process in Saturated Oil Reservoirs with Infinite-Acting Aquifer
...Show More Authors
Abstract<p>A hybrid Gas-Enhanced and Downhole Water Sink-Assisted Gravity Drainage (GDWS-AGD) process has been suggested to enhance oil recovery by placing vertical injectors for CO2 at the top of the reservoir with a series of horizontal oil-producing and water-drainage wells located above and below the oil-water contact, respectively. The injected gas builds a gas cap that drives the oil to the (upper) oil-producing wells while the bottom water-drainage wells control water cresting. The hybrid process of GDWS-AGD process has been first developed and tested in vertical wells to minimize water cut in reservoirs with bottom water drive and strong water coning tendencies. The wells were dual-compl</p> ... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Genetic Variations of Echinococcus granulosus Isolated from Sheep and Cows by Using Fingerprint DNA Method in Iraq
...Show More Authors

The fingerprinting DNA method which depends on the unique pattern in this study was employed to detect the hydatid cyst of Echinococcus granulosus and to determine the genetic variation among their strains in different intermediate hosts (cows and sheep).  The unique pattern represents the number of amplified bands and their molecular weights with specialized sequences to one sample which different from the other samples.   Five hydatitd cysts samples  from cows and sheep were  collected, genetic analysis for  isolated DNA was done using PCR technique and  Random Amplified Polymorphic DNA reaction(RAPD) depending on (4) random primers, and the results showed:      

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Valuation of Construction Projects Based on of Quantity Scale by using Expert System
...Show More Authors

The subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.

The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.

View Publication Preview PDF