Graphite coated electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Glibenclamide (Glb). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by radical bulk polymerization using (Glb.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using (AA) and (AAm) showed a near nernstian response with slopes of -51.5±0.5and 57.8±0.1mV/decade, correlation coefficient (r2) 0.9762 and 0.9992, a linear response for a concentration range of (1.0×10-4- 1.0×10-2) M and (1.0×10-5- 1.0×10-3) M and detection limit of 1.0×10-4M and 1.0×10-5M respectively. The response time of the prepared electrodes was less than 30 seconds. The electrode responses were stable in a pH range (2-4). The electrodes could be successfully used within (1and 6) weeks respectively without any drift. The sensors exhibited good selectivity over a wide range of interference. The most effective electrode was used to determine the concentration of (Glb.) in some pharmaceutical formulations.
In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreBacteria could produce bacterial nanocellulose through a procedure steps: polymerization and crystallization, that occur in the cytoplasm of the bacteria, the residues of glucose polymerize to (β-1,4) lineal glucan chains that produced from bacterial cell extracellularly, these lineal glucan are converted to microfbrils, after that these microfbrils collected together to shape very pure three dimensional pored net. It could be obtained a pure cellulose that created by some M.O, from the one of the active producer organism like Acetic acid bacteria (AAB), that it is a gram -ve, motile and live in aerobic condition. The bacterial nanocellulose (BNC) have great consideration in many fields because of its flexible properties, features
... Show MoreHistidine was determined via measurement of total luminescence (i:e creation of chemiluminescence and insitu irradiation of released light to an acceptor fluorophore molecule to initiate fluorescence from fluorescien molecule in flat – spiral micro cell designed for this measurement . A detailed description of robust linear equation for the range of 0.002 – 0.05 mol.L-1 for a sample size of 70 µL with a correlation coefficient of 0.9879 and a coefficient of determination of 97.59% while for a quadratic model of the same concentration range was 0.9881 correlation coefficient and 97.63% coefficient of determination. Analysis of variance was conducted for both kinds of models . It indicated that their was no significa
... Show MoreThe main objective of this paper is to determine an acceptable value of eccentricity for the satellites in a Low Earth Orbit LEO that are affected by drag perturbation only. The method of converting the orbital elements into state vectors was presented. Perturbed equation of motion was numerically integrated using 4th order Runge-Kutta’s method and the perturbation in orbital elements for different altitudes and eccentricities were tested and analysed during 84.23 days. The results indicated to the value of semi major axis and eccentricity at altitude 200 km and eccentricity 0.001are more stable. As well, at altitude 600 km and eccentricity 0.01, but at 800 km a
Abstract:
In this study a type of polymeric composites from melting poly propylene as a basic substance with Palm fronds powder were prepared. Evaluation of polymeric composites was done by studying some of it is mechanical properties, which included:Yong modulus (E), Impact Strength (I.S), Brinell hardness (B.H) and Compression Strength (C.S). The polymeric composites were studied before and after reinforcment by comparing between them. There was an increase in resistance of Yong modulus (E), Impact Strength (I.S), Brinell hardness (B.H) and compression Strength (C.S). Also, the effect of some acids were studied such as (HCl, H2
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.