Preferred Language
Articles
/
jmracpc-203
SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION: SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION
...Show More Authors

ABSTRACT

Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-4– 5.0 x 10-4( M, respectively and their response time was about 1 minute. The electrodes of fluid are lined with 0.1(M standardsolution of drug and their response was stable in a pH range from )1.0 to 11.0( and with good selectivity for over several species. The new electrodes were successfully applied for the analyte determination in preparation pharmaceutical sample without any time consuming pretreatment steps.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (18)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Dietary Habits on Urolithiatic Patients at Urinary Units in Baghdad Teaching Hospitals
...Show More Authors

Objectives: The study aims at finding the effectiveness of dietary habits on urolithiatic patients at Urinary Units
in Baghdad Teaching Hospitals.
Methodology: A quantitative descriptive study was conducted to identify the effectiveness of dietary habits on
(100) of urolithiatic patients in Urinary Units at Baghdad Teaching Hospitals starting from May 2011 to Sep.
2012.Data were collected through the use of constructed check list of the questionnaire format, which
consists of two parts: - The first part: is related to the patient's demographic variables ; the second part: is
constructed to serve the purpose of the study (effectiveness of the dietary habits). The total number of items
of the questionnaire is (69) item

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Building social intelligence scale and applied to a sample at the Deprived and non-Deprived students from their parents at the Secondary stage
...Show More Authors

The current research aims to :
•know the level of social intelligence of the sample as a whole .
. •taraf statistically significant differences in social intelligence between disadvantaged and
non-disadvantaged peers .
To achieve these objectives, the selected sample of Talbhalmrahlh medium and specifically
students of the second grade average, were chosen randomly stratified's (360) students
included sex (male, female) and (deprived of the Father and the non-deprived) for the
academic year (2013-2014) for the province of Baghdad on both sides (Rusafa-Karkh (
As applied to them measurements of social intelligence, which is prepared by the researcher,
having achieved _khasaúsma of psychometric (valid and re

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technical requirements for the application of economic intelligence and its impact On the dimensions of strategic success of banks: An applied research on a sample of Iraqi banks private
...Show More Authors

This research sheds light on one of the important and vital topics for the banking sectors (technical requirements for the application of economic intelligence) namely by (Hardware, equipment, communication networks, software, databases). And the dimensions of the strategic success of the banks represented by(Customer satisfaction, customer trust, quality of service, growth) In the three Iraqi private banks, namely(Assyria International Investment, Mansour Investment, International Development Investment and Finance). Its implementation is an urgent necessity in order to improve the quality of its banking services to win the satisfaction of its customers and their confidence and then grow to achieve stra

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Performance Evaluation Strategy and its Impact on the Achievement of Organizational Effectiveness
...Show More Authors

Abstract

The research aims to determine the impact of the strategy performance evaluation and of the Standards (leadership, people, knowledge, processes, financial) in the achievement of organizational effectiveness in accordance with the dimensions (planning and setting goals, Exploitation of the Environment, achieve the goals, the ability to adapt, information management and communications) and the relationship between them, the problem of the research in the growing interest in the process of performance evaluation for organizations, the erroneous belief that the performance evaluation activity is useful, and the fact that performance evaluation process is one of the main tasks of the work of the Office of the Inspecto

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Continuous improvement of technology and its role In reducing the costs in accordance with the management style On the basis of the activities (ABM): Applied Research in the General Company for Textile Industries / hula
...Show More Authors

The administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and  enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality   and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce  costs) to prove the hypothesis has sought research to achieve its goal of  Alkadivh and Alkoppelan     &nb

... Show More
View Publication Preview PDF