Liquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of liquid electrodes obtained from the calibration curves ranged from (-18.88– -29.01) mV/decade and (4.0 × 10-5 – 6.0 × 10-5) M, respectively and the response time was about 60 seconds. The Liquid electrodes were filled with (10-2 M) standard solution of the drug and observed stable response for a pH ranged from 2.0 to 11.0 and with good selectivity for over several species. The fresh electrodes of synthesis were effectively used in the pharmaceutical sample to determine DOMP without any time consuming pretreatment measures.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This paper deals with constructing mixed probability distribution from mixing exponential
Abstract
The current research aims to identify the effectiveness of social stories in increasing social interaction among children with an autism spectrum disorder. The researcher used the single-subject design methodology (Single Subject Designs, SSD) with
(A-B) design to answer the research questions. The study sample consisted of (3) children with autism spectrum disorder enrolled in a transit daycare center in the Asir region, Saudi Arabia. The results of the study showed that there is a positive functional relationship between social stories and play to increase social interaction among children with autism spectrum disorder, which contributed to the acquisition and generalization of this behav
... Show MoreIn this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tang
... Show MoreThis paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
This paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show Moreتعد لعبة كرة السلة من الألعاب الرياضية التي تحتاج متطلبات بدنية ووظيفية خاصة بها، وذلك من خلال الانتقال داخل الملعب بالكرة أو بدونها والسبل للتخلص من ملاحقة الخصم أثناء الدفاع وكيفية المناورة أثناء الهجوم مع إجادة التصويب بكافة أنواعه داخل الملعب، ومن هنا تكونت مشكلة البحث في كيفية تطوير تلك العوامل الوظيفية والتي لها الأثر في الارتقاء بمستوى أداء اللاعب أثناء اللعب، وعن طريق استخدام الباحثان لطريقة جهاز ا
... Show More