Preferred Language
Articles
/
ijs-7798
A Review of Biosensors; Definition, Classification, Properties, and Applications

     Biosensor is defined as a device that transforms the interactions between bioreceptors and analytes into a logical signal proportional to the reactants' concentration. Biosensors have different applications that aim primarily to detect diseases, medicines, food safety, the proportion of toxins in water, and other applications that ensure the safety and health of the organism. The main challenge of biosensors is represented in the difficulty of obtaining sensors with accuracy, specific sensitivity, and repeatability for each use of the patient so that they give reliable results. The rapid diversification in biosensors is due to the accuracy of the techniques and materials used in the manufacturing process and the interrelationships in scientific research between various disciplines, i.e., physics and biology, engineering and biology. This research aims to define biosensors in general, classify them and show their most important applications, with a brief description of their time development and the reason for their speared in all fields.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 18 2022
Journal Name
World Bulletin Of Public Health (wbph)
WASTEWATER TREATMENTS: A REVIEW

Many water supplies are now contaminated by anthropogenic sources such as domestic and agricultural waste, as well as manufacturing activities, the public's concern about the environmental effects of wastewater contamination has grown. Several traditional wastewater treatment methods, such as chemical coagulation, adsorption, and activated sludge, have been used to eliminate pollution; however, there are several drawbacks, most notably high operating costs, because of its low operating and repair costs, the usage of aerobic waste water treatment as a reductive medium is gaining popularity. Furthermore, it is simple to produce and has a high efficacy and potential to degrade pollu

... Show More
Publication Date
Tue Nov 19 2024
Journal Name
Al-kindy College Medical Journal
Metabolic Syndrome; Comparing the Results of Three Definition Criteria in an Iraqi Sample

Background: Different diagnostic definition and criteria have been recommended by different expert groups for the diagnosis of metabolic syndrome, however, it’s prevalence in the same population could differ depending on the definition used yielding different results. In Iraq, there is a lack of research comparing these different diagnostic definitions.

Objective: To find out the most suitable metabolic syndrome definition to be used for Iraqi people.

 Methods: 320 participants were recruited for this study, 53.4% men and 46.6% women, aged between 25-85 years, visiting Baghdad Teaching Hospital, the prevalence of metabolic syndrome according to different definition

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Al-kindy College Medical Journal
Metabolic Syndrome; Comparing the Results of Three Definition Criteria in an Iraqi Sample

Background: Different diagnostic definition and criteria have been recommended by different expert groups for the diagnosis of metabolic syndrome, however, it’s prevalence in the same population could differ depending on the definition used yielding different results. In Iraq, there is a lack of research comparing these different diagnostic definitions. Objective: To find out the most suitable metabolic syndrome definition to be used for Iraqi people.  Methods: 320 participants were recruited for this study, 53.4% men and 46.6% women, aged between 25-85 years, visiting Baghdad Teaching Hospital, the prevalence of metabolic syndrome according to different definitions were compared and the agreement was assessed by the Kappa st

... Show More
Crossref (2)
Crossref
View Publication
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review

     As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software across numerous fields and communities may now be processed through value chain networks. Despite the integration of all data networks, computing models, and distributed software that provides a broader cloud computing solution, the security solution is missing or inadequate, and more work is required to strengthen security requirements such as mutual entity trustworthiness, access controls, identity management, and data protection, all aspects of detecting and preventing attacks or threats. In order to combat cybersecurity threats, various international organizatio

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue May 02 2023
Journal Name
Journal Of Optoelectronics And Advanced Materials
Preparation of samarium doped-PMMA composite by casting method to evaluate the optical properties and potential applications

Samarium ions (Sm +3), a rare-earth element, have a significant optical emission within the visible spectrum. PMMA samples, mixed with different ratios of SmCl3.6H2O, were prepared via the casting method. The composite was tested using UV-visible, photoluminescence and thermogravimetric analysis (TGA). The FTIR spectrometry of PMMA samples showed some changes, including variation in band intensity, location, and width. Mixed with samarium decreases the intensity of the CO and CH2 stretching bands and band position. A new band appeared corresponding to ionic bonds between samarium cations with negative branches in the polymer. These variations indicate complex links between the Sm +3 ion and oxygen in the ether group. The optical absorption

... Show More
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
Scopus Crossref
View Publication
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

Scopus (4)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
View Publication