Two molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standard drug solution and its response were stable at pH ranges from 1.0 to 11.0 and with good selectivity for more than several type. The electrodes produced have been successfully applied in preparation of the pharmaceutical sample for the determination of the analyte without any time consuming pretreatment steps.
Electrospun nanofiber membranes are employed in a variety of applications due to its unique features. the nanofibers' characterizations are effected by the polymer solution. The used solvent for dissolving the polymer powder is critical in preparing the precursor solution. In this paper, the Polyacrylonitrile (PAN)-based nanofibers were prepared in a concentration of 10 wt.% using various solvents (NMP, DMF, and DMSO). The surface morphology, porosity, and the mechanical strength of the three prepared 10 wt.% PAN-based nanofibers membranes (PAN/NMP, PAN/DMF, and PAN/DMSO) were characterized using the Scanning Electron Microscopy (SEM), Dry-wet Weights method, and Dynamic Mechanical Analyzer (DMA). Using DMF as a solvent resulted in a lon
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreVarious speech enhancement Algorithms (SEA) have been developed in the last few decades. Each algorithm has its advantages and disadvantages because the speech signal is affected by environmental situations. Distortion of speech results in the loss of important features that make this signal challenging to understand. SEA aims to improve the intelligibility and quality of speech that different types of noise have degraded. In most applications, quality improvement is highly desirable as it can reduce listener fatigue, especially when the listener is exposed to high noise levels for extended periods (e.g., manufacturing). SEA reduces or suppresses the background noise to some degree, sometimes called noise suppression alg
... Show MoreTo damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.
An experimental study is conducted to investigate the effect of heat flux distribution on the boiling safety factor of its cooling channel. The water is allowed to flow in a horizontal circular pipe whose outlet surface is subjected to different heat flux profiles. Four types of heat flux distribution profiles are used during experiments: (constant distribution profile, type a, triangle distribution profile with its maximum in channel center, type b, triangle distribution profile with its maximum in the channel inlet, type c, and triangle distribution profile with its maximum in the channel outlet, type d). The study is conducted using heat sources of (1000 and 2665W), water flow rates of (5, 7 and 9 lit/min). The water
... Show MoreThis work investigates a simulation model of an underwater optical wireless communication (UOWC) system. Several water scenarios are considered: Harbor I (HA-I), Harbor II (HA-II), Coastal Ocean (CO), Clear Ocean (CL), and Pure Sea (PU). A laser diode (LD) with modulation schemes (NRZ-OOK) transmits data at various speeds of 2.5 Gbps, 5 Gbps, and 10 Gbps. To identify the optical signal, a single-photon detection (SPD), APD and PIN photodiodes are utilized. The analytical evaluation of the performance is executed using Q-factor, received power and bit error rate (BER). According to the results, the PU achieved an underwater distance of 35.5 m, 35 m, 34.5 m, for data tran
Biodiesel can be prepared from various types of vegetable oils or animal fats with the aid of a catalyst.
Calcium oxide (CaO) is one of the prospective heterogeneous catalysts for biodiesel synthesis. Modification
of CaO by impregnation on silica (SiO2) can improve the performance of CaO as catalyst. Egg shells and rice
husks as biomass waste can be used as raw materials for the preparation of the silica modified CaO catalyst.
The present study was directed to synthesize and characterize CaO impregnated SiO2 catalyst from biomass
waste and apply it as catalyst in biodiesel synthesis. The catalyst was synthesized by wet impregnation
method and characterized by x-ray diffraction, x-ray fluorescence, nitr
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023