The UV−VIS absorption spectroscopy technique was used to study the formation of a new complex of charge transfer (CT) between bioactive organic molecules as (Nystatin) containing both a π-electrons from a conjugated system and lone-pair of electrons (amine) with Tetrachloro-1,4 benzoquinone (TCBQ) as a π-acceptor in which the transferred electron goes into its vacant anti-bonding molecular orbitals. The Tyrian purple-colored complex formed was quantitatively measured at 544 nm. This complex shows obeying Beer's law within the concentration range of (10-90) μg.ml-1The stoichiometry of the formed complex between the (Nys.) and (TCBQ) was found 1:2 as evaluated by continuous variation (Job's method) and mole ratio method The value of molar absorptivity was calculated at 7038.2840 L.mol-1.cm-1, while Sandell’s sensitivity value was estimated to be 0.01315 μg.cm-2, while LOD and LOQ were found to be 0.5661and 1.71558 μg.ml-1, respectively. The Charge-Transfer complex association constant (KCT) value was evaluated using Benesi-Hildebrand equation and was found to be 3.00E+03 L.mol-1. This procedure was successfully involved in the analysis of pharmaceutical formulations.
Loratadine is a long acting non-sedating anti-histaminic agent that was developed for the treatment of seasonal allergic rhinitis, whose anti-histaminic action is more effective than the other anti-histaminic drugs available commercially. This project was carried out to prepare an acceptable suspension through studying the release of drug in presence of different types and concentrations of suspending agents such as polysorbate 40, xanthan gum, sodium carboxymethylcellulose (NaCMC), aluminum magnesium silicate (veegum) and sodium alginate. The effects of these suspending agents were studied at pH 1.2 (0.1N HCl) and 37 Ù’C. The results showed that the release rate of loratadine in the presence of these suspending agents was dependent o
... Show MoreThis study revolves around the rapid changes of science and a comparison of the formal and practical aspects and the reason behind summoning the changes and their types, which are subject to the influence of the recipient. This transformation represents formal and intellectual production cycles and formal functional generation that is subject to the goals of the system of multiple differences at the level of time and place. It meets the needs and the request for change, but access to it comes through multiple systems and portals that are different from the normal and the usual, so this study was called (meta and its dimensions in the designed biological formation (virtual reality environment - a model). The research seeks to find solutio
... Show MoreThis paper studies the main characteristics of the traditional urban configuration of Arab cities, as an important built heritage, discussing the approach adopted with such configuration at the local level, and examines its ability to preserve the character of the city, as well as, its responsiveness to the recent requirements of its society that constantly change; in order to reach the appropriate procedures to deal with the traditional urban configuration of the Iraqi city to achieve a vital cultural communication with the vernacular built heritage, by dealing with the Form-Moral Values structure. Due to its importance within other traditional Iraqi cities, the research chose Al-Kadhimiya as a case study, so it discusses and compares
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Deci
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract
The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the lev
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.
Pure and doped barium titanate with Mg2+ ion at two molar ratios x= (5%, 10%) mol. has been synthesized by solid state reaction technique. The powders sintered at two temperatures (1000 °C and 1400 °C). An XRD technique was used in order to study the crystal structure of pure and doped barium titanate, which confirmed the formation of the tetragonal phase of BaTiO3, and then calculate the lattice parameters of pure and doped barium titanate, the addition of magnesium ion Mg2+ can lead to decreases lattice parameters.