A new simultaneous spectrophotometric-kinetic method was developed to determine phenylephrine (PHEN) and tetracycline (TETR) via H-point standard addition method (HPSAM). The proposed procedures rely on the measurements of the difference in the rate of charge-transfer (CT) reaction between each of PHEN and TETR as electron donors with p-Bromanil (p-Br) as an electron acceptor. Different experimental factors which affect the extent of the complex formation were investigated by monitoring the value of absorbance at 446 nm. Time pair of 50 -100 sec was selected and employed, among different examined pairs since it results in the highest accuracy for HPSAM-plot. Linear calibration graphs in the concentration ranges of 10.0-40.0 and 10.0–50.0 mg/L were obtained for PHEN and TETR, respectively and the proposed method was applied successfully in the determination of PHEN and TETR in their pure form and in commercial formulations.
Abstract
This research is aimed at indicating the impact of business process reengineering on corporate performance in the Office of the Inspector General of the Ministry of Higher Education and Scientific Research of the Iraqi study has identified a problem in a number of the most important questions - what the impact of the Business Process Reengineering at the corporate office performance indicators respondent? What are the actual results of the analysis of paths Administrative Process Engineering and Corporate Performance respondent in the office? In order to achieve the goal of the research and answer the questions of the problem, the study applied to a sample of
... Show MoreThe research aims to clarify the role that psychological ownership, through its dimensions, plays in deterring the effects of toxic leadership, through its dimensions, in the Ministry of Industry and Minerals. The research started with a basic problem represented by the following question: "Using psychological ownership and its application in deterring the negative effects of toxic leadership." The research used the descriptive-analytical method. The sample was randomly selected from workers in some selected companies affiliated with the Ministry of Industry and Minerals in Baghdad, and the sample size reached 124 individuals. One of the most important results is that there is an effect of the psychological ownership variable, based on the
... Show MoreA specific, sensitive and new simple method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation of ion pair compound between methyldopa and potassium hexacyanoferrate in acidic medium to obtain a yellow precipitate complex using long distance chasing photometer (NAG-ADF-300-2). The linear range for calibration graph was 0.05-35 mmol/L for cell A and 0.05-25 mmol/L for cell B, and LOD 1.4292 µg /200 µL for both cells with correlation coefficient (r) 0.9981 for cell A and 0.9994 for cell B, RSD% was lower than 0.5 % for n=8 for. The results were compared with classical method UV-Spectrophotometric at λ max=280 nm and turbi
... Show MoreKA Hadi, AH Asma’a, IJONS, 2018 - Cited by 1
The research aims to show the relationship between artificial intelligence in accounting education and its role in achieving sustainable development goals in the Kingdom of Bahrain. The research dealt with the role of artificial intelligence applications in accounting education at the University of Applied Sciences as a model for Bahraini universities to achieve sustainable development goals. The application of artificial intelligence in accounting education achieves seven of the seventeen sustainable development goals. It also concludes that there is an artificial intelligence infrastructure in the Kingdom of Bahrain, as it occupies a leading regional position in digital transformation, as Bahrain ranks first in the Arab world i
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreA numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro