Preferred Language
Articles
/
bsj-6686
Spectrophotometric Analysis of Vancomycin Hydrochloride in Pure and Pharmaceutical Injections via Batch and Cloud Point Extraction Techniques
...Show More Authors

Development of a precise and delicate reaction has been acquired for the determination of vancomycin hydrochloride using batch and cloud point extraction (CPE) methods. The first method is based on the formation of azo dye as a result of diazotized dapsone coupled with vancomycin HCl (VAN) in a basic medium. The sensitivity of this reaction was enhanced by utilizing a nonionic surfactant (Triton X-114) and the cloud point extraction technique (second method). The azo dye formed was extracted into the surfactant-rich phase, dissolved in ethanol and detected at λmax 440 nm spectrophotometrically. The reaction was investigated using both batch and CPE methods (with and without extraction), and a simple comparison between the two developed methods was made. The conditions that affect the extraction process and the sensitivity of the methods have been carefully examined. The linearity of the calibration curves was in the range of 3-50 and 0.5- 25 µg.mL-1 with limits of detection of 0.806 and 0.462 µg.mL-1 for VAN in both batch and CPE procedures, respectively. The percentage of relative standard deviation (R.S.D.%) for the two methods was better than 2.54% and 2.83%, respectively. The recommended procedures have been effectively used to assay VAN in commercial injections.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Common Fixed Point problem for Classes of Nonlinear Maps in Hilbert Space
...Show More Authors
Abstract<p>in this article, we present a definition of k-generalized map independent of non-expansive map and give infinite families of non-expansive and k-generalized maps new iterative algorithms. Such algorithms are also studied in the Hilbert spaces as the potential to exist for asymptotic common fixed point.</p>
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of Educational And Psychological Researches
Teaching Explanation Difficulties in Islamic University from the lecturers Point of View
...Show More Authors

This study is about awareness of teaching explanation difficulties in the Islamic university from the lecturers point of view. It discussed the difficulties and the traditional teaching methods of explanation. The study concentrated on teaching Islamic studies in general and teaching explanation in specific and set difficulties so as to be treated.

            The study is of three chapters, the first contains the difficulties in several aspects like the educational goals, text contents, teaching methods and styles, students, educational techniques, educational aids and evaluation, it addition to the lecturers of Islamic university colleges in 2009-2

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Mon Jun 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Factors Affecting the Extraction Process
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluation of Sustainable Spatial Suitability of Urban and Population Expansion in Al Hillah City Using Remote Sensing Techniques
...Show More Authors
Abstract<p>The study focused on explaining urban expansion and sustainable development of urban land and explaining the role of population expansion in Al Hillah city, Al Hillah city in the center of Babylion Governorate located. The study relied on analyzing the population data of the city of Al Hillah for a period of time (22 years) for the period (2000-2022). This data was analyzed and its role in planning and designing residential areas and neighborhoods in the Al Hillah city was analyzed based on the standards of urban planning and sustainable growth of cities. Landsat 5TM was used in the investigation, Landsat 8OLI satellite data to retrieve the NDVI, NDBI, and NDWI. The findings showed th</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Applied Mechanics And Materials
Artistic Techniques for Developing Creativity in Design
...Show More Authors

The design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Journal Of Education College Wasit University
Cloud Computing Adoption by Higher Education Institutions of Iraq: An Empirical Study
...Show More Authors

In the last years, a new technology called Cloud computing has been developed. Empirical and previous studies, commonly examined in business field and other domains. In this study, the significant factors that affecting the adoption of cloud computing have been examined using a frequency analysis that have been explored by the previous studies. The results showed that the most effected factors were relative advantage which followed by security and privacy, complexity, innovativeness, and external support. In this study the model of technology organization-environment was used to examine the significant factors that affecting the adoption of cloud computing.