A new simultaneous spectrophotometric-kinetic method was developed to determine phenylephrine (PHEN) and tetracycline (TETR) via H-point standard addition method (HPSAM). The proposed procedures rely on the measurements of the difference in the rate of charge-transfer (CT) reaction between each of PHEN and TETR as electron donors with p-Bromanil (p-Br) as an electron acceptor. Different experimental factors which affect the extent of the complex formation were investigated by monitoring the value of absorbance at 446 nm. Time pair of 50 -100 sec was selected and employed, among different examined pairs since it results in the highest accuracy for HPSAM-plot. Linear calibration graphs in the concentration ranges of 10.0-40.0 and 10.0–50.0 mg/L were obtained for PHEN and TETR, respectively and the proposed method was applied successfully in the determination of PHEN and TETR in their pure form and in commercial formulations.
Background: Human semen contains high concentrations of fructose, zinc (Zn) and copper (Cu) in bound and ionic forms for Zn and Cu. The presence of abnormal levels of fructose and those trace elements may affect spermatogenesis with regard to production, maturation, motility and fertilizing capacity of the spermatozoa.Objective: To evaluate the levels of fructose, Zn and Cu in seminal plasma in different groups of male infertility and to correlate their concentrations with various sperm parameters.Methods: The concentrations of fructose, Zn and Cu were measured in 114 semen samples from normozoospermic, oligozoospermic, astheno-zoospermic, and azoospermic men using the electrothermal-atomic absorption spectrometry for Zn and Cu determinatio
... Show MoreViscosities (η) and densities (ρ) of atenolol and propranolol hydrochloride in water and in concentrations (0.05 M) and (0.1 M) aqueous solution of threonine have been used to reform different important thermodynamic parameters like apparent molal volumes fv partial molal volumes at infinite dilution fvo , transfer volume fvo (tr), the slop Sv , Gibbs free energy of activation for viscous flow of solution ΔG*1,2 and the B-coefficient have been calculated using Jones-Dole equation. These thermodynamic parameters have been predicted in terms of solute-solute and solute-solvent interaction.
الاحداث السياسية في العراق بعد 2003 وأثر الانتماء والوعي في التشكيل العراقي المعاصر
The experiment was carried out in the green house of botanical garden belong to Department of Biology/College of Education for Pure Science Ibn AL-Haitham, University of Baghdad for growing season 2017-2018 to evaluate effect of lead stress with concentrations (0, 50, 100, 150) mg.L -1 and Selenium concentrations (0, 15, 30) mg.L-1 on growth of dill plant using pots. The experiment was designed according to completely randomized design (CRD) with three replications. Result indicated that dill plants subjected to lead stress with height concentrations caused decrease in plant parameters (plant height, no. of branches. plant-1, root length, shoot dry weight, the content of nitrogen, phosphorus and potassium, protein concentration, no. of umbe
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show More