ABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreThe structural properties of ternary chalcopyrite AgAlSe2 compound alloys and thin films that prepared by the thermal evaporation method at room temperature on glass substrate with a deposition rate (5±0.1) nm s-1 for different values of thickness (250,500 and 750±20) nm, have been studied, using X-ray diffraction technology. As well as, the optical properties of the prepared films have been investigated. The structural investigated shows that the alloy has polycrystalline structure of tetragonal type with preferential orientation (112), while the films have amorphous structure. Optical measurement shows that AgAlSe2 films have high absorption in the range of wavelength (350-700 nm). The optical energy gap for allowed direct transition we
... Show MoreThis investigation reports application of a mesoporous nanomaterial based on dicationic ionic liquid bonded to amorphous silica, namely nano-N,N,N′,N′-tetramethyl-N-(silican-propyl)-N′-sulfo-ethane-1,2-diaminium chloride (nano-[TSPSED][Cl]2), as an extremely effectual and recoverable catalyst for the generation of bis(pyrazolyl)methanes and pyrazolopyranopyrimidines in solvent-free conditions. In both synthetic protocols, the performance of this catalyst was very useful and general and presented attractive features including short reaction times with high yields, reasonable turnover frequency and turnover number values, easy workup, high performance under mild conditions, recoverability and reusability in 5 consecutive runs without lo
... Show MoreAim: The reduction in the amount of marginal bone is the most important demand for the long term success of dental implants. This prospective clinical study was aimed to investigate the marginal bone loss of early loaded SLActive implants with different dimensions and surgical approaches. Materials and methods Fifteen patients aged from 18 to 60 years were divided into 2 groups (flapped and flapless approach) that underwent delayed implant placement protocol with SLActive implants. The marginal bone level was estimated by cone-beam computed tomography during three different periods: preoperatively, 8 weeks after surgery and 24 weeks after loading of the prosthesis. Results: The mean value of marginal bone level was not significantly chan
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreIn low-latitude areas less than 10° in latitude angle, the solar radiation that goes into the solar still increases as the cover slope approaches the latitude angle. However, the amount of water that is condensed and then falls toward the solar-still basin is also increased in this case. Consequently, the solar yield still is significantly decreased, and the accuracy of the prediction method is affected. This reduction in the yield and the accuracy of the prediction method is inversely proportional to the time in which the condensed water stays on the inner side of the condensing cover without collection because more drops will fall down into the basin of the solar-still. Different numbers of scraper motions per hour (NSM), that is
... Show MoreGraphite Coated Electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Risperidone (Ris). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by bulk polymerization using (Ris.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using
... Show MoreObjective(s): To determine the effect of obesity and socioeconomic status upon adolescents' high school students' intelligence quotient in Baghdad City. Methodology: A descriptive design is carried throughout the study to determine the effect of obesity and socioeconomic status on adolescents' high schools students' intelligence quotient in Baghdad City for the period of January 7th 2017 to May 29th 2017. A non-probability, purposive sample, of (120) high school students, is selected. The sample is comprised of (12) students from 7th grade, (26) students from 8 th grade, (14) students from 9th grade, (3
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More