Two molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standard drug solution and its response were stable at pH ranges from 1.0 to 11.0 and with good selectivity for more than several type. The electrodes produced have been successfully applied in preparation of the pharmaceutical sample for the determination of the analyte without any time consuming pretreatment steps.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show More<span>As a result of numerous applications and low installation costs, wireless sensor networks (WSNs) have expanded excessively. The main concern in the WSN environment is to lower energy consumption amidst nodes while preserving an acceptable level of service quality. Using multi-mobile sinks to reduce the nodes' energy consumption have been considered as an efficient strategy. In such networks, the dynamic network topology created by the sinks mobility makes it a challenging task to deliver the data to the sinks. Thus, in order to provide efficient data dissemination, the sensor nodes will have to readjust the routes to the current position of the mobile sinks. The route re-adjustment process could result in a significant m
... Show MoreThe microbend sensor is designed to experience a light loss when force is applied to the sensor. The periodic microbends cause propagating light to couple into higher order modes, the existing higher order modes become unguided modes. Three models of deform cells are fabricated at (3, 5, 8) mm pitchand tested by using MMF and laser source at 850 nm. The maximum output power of (8, 5, 3)mm model is (3, 2.7, 2.55)nW respectively at applied force 5N and the minimum value is (1.9, 1.65, 1.5)nW respectively at 60N.The strain is calculated at different microbend cells ,and the best sensitivity of this sensor for cell 8mm is equal to 0.6nW/N.
With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreNew Schiff-base ligands bearing tetrazole moiety and their polymeric metal complexes with Co(II), Ni(II) and Cd(II) ions are reported. Ligands were prepared in a multiple-step reaction. The reaction of sodium 2,6- diformylphenolate and cyclohexane-1,3-dione with 5-amino-2-fluorobenzonitrile resulted in the isolation of two precursors sodium 2,6-bis((E)-(3-cyano-4-fluorophenylimino)methyl)-4-methylphenolate 1 and 5,5'- (1E,1'E)-cyclohexane-1,3-diylidenebis- (azan-1-yl-1-ylidene)bis(2-fluorobenzonitrile) 2, respectively. The reaction of precursors with azide gave the required ligands; sodium 2,6-bis((E)-(4-fluoro-3-(1H-tetrazol-5- yl)phenylimino)methyl)-4-methylphenolate (NaL) and (N, N'E, N, N'E)-N, N'-(cyclohexane-1,3-diylidene)bis(4- fluor
... Show MoreNew Schiff-base ligands bearing tetrazole moiety and their polymeric metal complexes with Co(II), Ni(II) and Cd(II) ions are reported. Ligands were prepared in a multiple-step reaction. The reaction of sodium 2,6- diformylphenolate and cyclohexane-1,3-dione with 5-amino-2-fluorobenzonitrile resulted in the isolation of two precursors sodium 2,6-bis((E)-(3-cyano-4-fluorophenylimino)methyl)-4-methylphenolate 1 and 5,5'- (1E,1'E)-cyclohexane-1,3-diylidenebis- (azan-1-yl-1-ylidene)bis(2-fluorobenzonitrile) 2, respectively. The reaction of precursors with azide gave the required ligands; sodium 2,6-bis((E)-(4-fluoro-3-(1H-tetrazol-5- yl)phenylimino)methyl)-4-methylphenolate (NaL) and (N,N'E,N,N'E)-N,N'-(cyclohexane-1,3-diylidene)bis(4- fluoro-3-
... Show More