Preferred Language
Articles
/
ijs-6248
Potentiometric Determination of Mebeverine Hydrochloride Using Imprinted Molecular Polymer in PVC Matrix Membrane
...Show More Authors

Four molecular imprinted polymer (MIP) membranes for Mebeverine.HCl (MBV.HCl) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of 2-acrylamido-2-methyl-1-propane sulphonic acid (AMPS) as monomer, pentaerythritoltriacrylate (PETRA) as a cross linker ,benzoyl peroxide (BPO) as an initiator and mebeverine as a template. Four different types of plasticizers of different viscosities were used and the electrodes were fully characterized in terms of plasticizer type, response time, lifetime, pH and detection limit.
The MBV-MIP electrodes exhibited Nernstian response in concentration range from 1.0×10-6 to1.0×10-1 M with slopes of 13.98, 19.60, -20.43 and 19.01 mV/ decade. The detection limit and quantification are found to be 4×10-6, 3× 10-6, 2× 10-5and 1.2× 10-6 M ,respectively. Interference study for inorganic cations and amino acids was also studied. The best electrode based tris (2-ethyl hexyl) phosphate plasticizer was applied successfully for potentiometric determination of mebeverine in commercial tablets. Excellent average recovery obtained by potentiometric methods was about 102.26% which is in good agreements with British Pharmacopoeia.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Corrosion behavior of mild-steel in cooling towers using high salinity solution
...Show More Authors

Cooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Cutting Force in Turning Process by Using Artificial Neural Network
...Show More Authors

       

Cutting forces are important factors for determining machine serviceability and product quality. Factors such as speed feed, depth of cut and tool noise radius affect on surface roughness and cutting forces in turning operation. The artificial neural network model was used to predict cutting forces with related to inputs including cutting speed (m/min), feed rate (mm/rev), depth of cut (mm) and work piece hardness (Map). The outputs of the ANN model are the machined cutting force parameters, the neural network showed that all (outputs) of all components of the processing force cutting force FT (N), feed force FA (N) and radial force FR (N) perfect accordance with the experimental data. Twenty-five samp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Protection of Galvanized steel from corrosion in salt media using sulfur nanoparticles
...Show More Authors

                The characteristics of sulfur nanoparticles were studied by using atomic force microscope (AFM) analysis. The atomic force microscope (AFM) measurements showed that the average size of sulfur nanoparticles synthesized using thiosulfate sodium solution through the extract of cucurbita pepo extra was 93.62 nm. Protecting galvanized steel from corrosion in salt media was achieved by using sulfur nanoparticles in different temperatures. The obtained data of thermodynamic in the presence of sulfur nanoparticles referred to high value as compares to counterpart in the absence of sulfur nanoparticles, the high inhibition efficiency (%IE) and corrosion resistance were at high temperature, the corrosion rate or weig

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering Science And Technology
Using sustainable material in improvement the geotechnical properties of soft clayey soil
...Show More Authors

Preview PDF
Scopus (39)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prevention of Scale Formation in Heat Exchanger Pipes by Using Magnetic Field
...Show More Authors

The possibility of using the magnetic field technique in prevention of forming scales in heat exchangers pipes using
hard water in heat transfer processes, also the studying the effective and controllable parameters on the mechanism of
scale formation.
The new designed heat exchanger experimental system was used after carrying out the basic process designs of the
system. This system was used to study the effect of the temperature (40-90 °C) and water flow rate (0.6-1.2 L/min) on
the total hardness with time as a function of precipitation of hardness salts from water and scale formation.
Different magnetic field designs in the heat exchanger experimental system were used to study the effect of magnetic
field design a

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF