Preferred Language
Articles
/
jmracpc-233
SYNTHESIS OF NEW LEVOFLOXACIN SELECTIVE MEMBRANE SENSOR BASED ON MOLECULARLY IMPRINTED POLYMERS.: SYNTHESIS OF NEW LEVOFLOXACIN SELECTIVE MEMBRANE SENSOR BASED ON MOLECULARLY IMPRINTED POLYMERS.
...Show More Authors

Two molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared.  The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid  electrodes were packed with 0.1 M standard drug solution and its response were stable at pH ranges from 1.0 to 11.0 and with good selectivity for more than several type. The electrodes produced have been successfully applied in preparation of the pharmaceutical sample for the determination of the analyte without any time consuming pretreatment steps.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Investigation of Optimum Heat Flux Profile Based on the Boiling Safety Factor
...Show More Authors

An experimental study is conducted to investigate the effect of heat flux distribution on the boiling safety factor of its cooling channel. The water is allowed to flow in a horizontal circular pipe whose outlet surface is subjected to different heat flux profiles. Four types of heat flux distribution profiles are used during experiments: (constant distribution profile, type a, triangle distribution profile with its maximum in channel center, type b, triangle distribution profile with its maximum in the channel inlet, type c, and triangle distribution profile with its maximum in the channel outlet, type d). The study is conducted using heat sources of (1000 and 2665W), water flow rates of (5, 7 and 9 lit/min). The water

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 15 2008
Journal Name
Journal Of Kerbala University
Synthesis and Characterization of New Ligand type N2O2 and its complexes with (Co(II),Ni(II),Cu(II),Zn(II) and Cd(II) ions
...Show More Authors

The [2-hydroxy-1, 2-diphynel-ethanone oxime] was reacted with 1, 2-dichloroethan to give the new ligand [H2L]. this ligand was reacted with some metal ions (Co (II), Ni (II), Cu (II), Zn (II) and Cd (II) in methanol as a solvent to give a series of new (1: 1) complexes of the general formula [M (HL)] Cl,(where: M= Co (II), Ni (II), Cu (II), Zn (II) and Cd (II)) are isolated All compounds have been characterized by spectroscopic methods [IR, UV-Vis] atomic absorption. Chloride content along with conductivity measurements. From the above data the proposed molecular structure for (Co, Cu, Ni, Zn and Cd) complexes adopting a tetrahedral structure

Publication Date
Wed May 07 2008
Journal Name
Journal Of Kerbala University
Synthesis and Characterization of New Ligand type N2O2 and its complexes with (Co(II),Ni(II),Cu(II),Zn(II) and Cd(II) ions
...Show More Authors

The [2-hydroxy -1,2-diphynel-ethanone oxime] was reacted with 1,2- dichloroethan to give the new ligand [H2L].this ligand was reacted with some metal ions (Co(II),Ni(II),Cu(II),Zn(II) and Cd(II) in methanol as a solvent to give a series of new (1:1)complexes of the general formula [ M(HL)]Cl ,( where : M= Co(II),Ni(II),Cu(II),Zn(II) and Cd(II)) are isolated All compounds have been characterized by spectroscopic methods [ I.R , U.V -Vis ] atomic absorption . Chloride content along with conductivity measurements. From the above data the proposed molecular structure for (Co, Cu, Ni, Zn and Cd) complexes adopting a tetrahedral structure.

Publication Date
Wed Jul 01 2015
Journal Name
Diyala Journal For Pure Sciences
Synthesis and Biological Studies of Co(II),Ni(II),Cu(II) and Zn(II)Complexes with New Compound N-[(2,3-dioxoindolin-1-yl)-Nmethylbenzamide].
...Show More Authors

The N-[(2,3-dioxoindolin-1-yl)-N-methylbenzamide] was prepared by the reaction of acetanilide with isatin then in presence of added paraformaldehyde, the prepared ligand was identified by microelemental analysis, FT.IR and UV-Vis spectroscopic techniques. Treatment of the prepared ligand with the following selected metal ions (CoII, NiII, CuII and ZnII) in aqueous ethanol with a 1:2 M:L ratio, yielded a series of complexes of the general formula [M(L)2Cl2]. The prepared complexes were characterized using flame atomic absorption, (C.H.N) analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). From the obtained data the octahed

... Show More
Publication Date
Thu May 17 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis, Characterization and Study of Biological Activity of Some New Schiff Bases, 1, 3-Oxazepine and Tetrazole Derived from 2, 2 di thiophenyl Acetic Acid
...Show More Authors

In this study new derivatives of Schiff bases 5-8, 1, 3-oxazepine 9-16 and tetrazoles 17-19 have been synthesized from the new starting material 1 which has synthesized the reaction of one mole of dichloro acetic acid and two moles of thiophenol, the esters 2-3 were synthesized from the reaction of compound 1 with methanol or ethanol respectively in the presence of H2SO4 as catalyst then 2, 2-dithiophenylaceto Hydrazide 4 were synthesized from the reaction of 2 or 3 with hydrazine hydrate 80%, Schiff bases 5-8 were synthesized from the reaction of 4 with appropriate aldehyde or ketone. Treatment of Schiff bases with maleic and phathalic anhydride in dry benzene to give 1, 3-oxazepen derivatives 9-16 and with sodium azide in tetrahydrofuran

... Show More
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Study the Effect of Various Parameters on the Synthesis of ZSM-5 Zeolite
...Show More Authors

ZSM-5 zeolite was synthesis under hydrothermal conditions at 175oC. The synthesis parameters have been investigated to find optimum synthesis method. Firstly, the crystallization time has been investigated to find the optimum crystallization time. Also, the ageing time was studied. The morphology, structure, and composition of the synthesized ZSM-5 zeolite were characterized using scanning electron microscopy (SEM), pH meter, viscometer, and X-ray powder diffraction (XRD). The bulk Si/Al ratio of ZSM-5 zeolite was in the range of 9.5—11.7. The synthesized ZSM-5 zeolite with appropriate ageing time could adjust crystal size and degree of the crystallinity. The crystal size of ZSM-5 zeolite obtained at an agei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More