Preferred Language
Articles
/
kRYsD4cBVTCNdQwCoTMn
Fast Synthesis and Characterization of Nano-SSZ-13 Zeolite by Hydrothermal Method
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Jun 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Development and Characterization of Controlled Release Tablets of Candesartan Cilexetil/ β‑Cyclodextrin Inclusion Complex
...Show More Authors

Objective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Preparation, Characterization and Study of Biological Activities of New Organozinc Compounds Drived from Cytosine
...Show More Authors

The novel heterocyclic organozinc compounds were prepared from the reaction of diazonum salt cytosine zinc chloride with thymol and vanilin as coupler components. The prepared compounds were characterized by elemental analysis and UV-Vis, FTIR and 1HMNR spectroscopic techniques. The biological activity was also studied for all prepared compounds. 

View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Natural Pigment –Poly Vinyl Alcohol Nano composites Thin Films for Solar Cell: nanocomposites thin film
...Show More Authors

Solar cells thin films were prepared using polyvinyl alcohol (PVA) as a thin film, with extract of natural pigment from local flower. A concentration of 0.1g/ml of polyvinyl alcohol solution in water was prepared for four samples, with various concentrations of plant pigment (0, 15, 25 and 50) % added to each of the four solutions separately for preparing (PVA with low concentrated dye , PVA with medium concentrated dye and PVA with high concentrated dye ) thin films respectively . Ultraviolet absorption regions were obtained by computerized UV-Visible (CECIL 2700). Optical properties including (absorbance, reflectance, absorption coefficient, energy gap and dielectric constant) via UV- Vis were tested, too.  Fourier transform infra

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FINITE ELEMENT METHOD FOR INCOMPRESSIBLE VISCOELASTIC MATERIALS
...Show More Authors

A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
New Iterative Method for Solving Nonlinear Equations
...Show More Authors

The aim of this paper is to propose an efficient three steps iterative method for finding the zeros of the nonlinear equation f(x)=0 . Starting with a suitably chosen , the method generates a sequence of iterates converging to the root. The convergence analysis is proved to establish its five order of convergence. Several examples are given to illustrate the efficiency of the proposed new method and its comparison with other methods.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Suggested method for modifying the site parameter
...Show More Authors

     Estimating multivariate location and scatter with both affine equivariance and positive break down has always been difficult. Awell-known estimator which satisfies both properties is the Minimum volume Ellipsoid Estimator (MVE) Computing the exact (MVE) is often not feasible, so one usually resorts to an approximate Algorithm. In the regression setup, algorithm for positive-break down estimators like Least Median of squares typically recomputed the intercept at each step, to improve the result. This approach is called intercept adjustment. In this paper we show that a similar technique, called location adjustment, Can be applied to the (MVE). For this purpose we use the Minimum Volume Ball (MVB). In order

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Reduced Complexity SLM Method for PAPR Reduction
...Show More Authors

In this paper, the computational complexity will be reduced using a revised version of the selected mapping (SLM) algorithm. Where a partial SLM is achieved to reduce the mathematical operations around 50%. Although the peak to average power ratio (PAPR) reduction gain has been slightly degraded, the dramatic reduction in the computational complexity is an outshining achievement. Matlab simulation is used to evaluate the results, where the PAPR result shows the capability of the proposed method.  

 

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 03 2022
Journal Name
Tikrit Journal Of Pure Science
A Pixel Based Method for Image Compression
...Show More Authors

The basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More