Preferred Language
Articles
/
IRe2DZABVTCNdQwCMoPz
Validation of UV-visible spectrophotometric method for niclosamide in different media
...Show More Authors

Purpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identity, crystallinity and purity of NIC. In all media, the measured concentration of NIC was within ± 5 % of the actual value, which confirmed accuracy. The percentage relative standard deviation values were < 1 %, reflecting the precision of the method. The range of concentration measured was between 2 and 24 μg/mL, and all coefficient of determination (R2) values were > 0.99, indicating the linearity of the established analytical method. The limit of detection (LOD) and limit of quantification (LOQ) values were 0.122 and 0.407 μg/mL in ethanol, 0.530 and 1.766 μg/mL in ABS (pH 1.2), 0.224 and 0.747 μg/mL in DW, and 0.798 and 2.662 μg/mL in PBS, pH 7.4. The robustness was confirmed as the measured concentration under slight changes in temperatures and wavelengths were insignificant (p > 0.05). Conclusion: Based on the results above, the UV-visible spectrophotometric method under investigation was validated to be accurate, precise, linear, and robust in all the different media for the determination of NIC.

Scopus
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Solving Fractional Damped Burgers' Equation Approximately by Using The Sumudu Transform (ST) Method
...Show More Authors

       In this work, the fractional damped Burger's equation (FDBE) formula    = 0,

View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
The Linear Delay Fourth Order Eigen-Value Problems Solved By the Collocation Method
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Chromium (VI) Removal from Wastewater by Electrocoagulation Process Using Taguchi Method: Batch Experiments
...Show More Authors

Electrocoagulation is an electrochemical method for treatment of different types of wastewater  whereby sacrificial anodes corrode to release active coagulant (usually aluminium or iron cations) into solution, while simultaneous evolution of hydrogen at the cathode allows for pollutant removal by flotation or settling. The Taguchi method was applied as an experimental design and to determine the best conditions for chromium (VI) removal from wastewater. Various parameters in a batch stirred tank by iron metal electrodes: pH, initial chromium concentration, current density, distance between electrodes and KCl concentration were investigated, and the results have been analyzed using signal-to-noise (S/N) ratio. It was found that the r

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Feb 25 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Tensile force measurement by using different lingual retainer wires, bonding materials types and thickness (A comparative in vitro study)
...Show More Authors

Background: The bonded orthodontic retainer constructed from multistrand wire and composite is an efficient esthetic retainer, which can be maintained long-term. Clinical failures of bonded orthodontic retainers, most commonly at the wire/composite interface, have been reported. This in vitro investigation aimed to evaluate the tensile forces of selected multistrand wires and composite materials that are available for use in the construction of bonded fixed retainers. Materials and Methods: The study sample includes 120 wires with three types of retainer wires (3 braided strands\ Orthotechnology, 8 braided strands\ G&H Orthodontics, 6 coaxial strands\ Orthoclassic wires), two types of adhesive (flowable\ Orthotechnology, non flowable\ G&H O

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 25 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of nano surface modification on CPTi dental implant using chemical method: mechanical and histological evaluation
...Show More Authors

Background The application of nanotechnology to biomedical surfaces is explained by the ability of cells to interact with nanometric features. The aim of this study was to consider the role of nanoscale topographic modification of CPTi dental implant using chemical etching method for the purpose of improving osseointegration. Materials and methods: Commercial pure titanium rod was machined into 20 dental implants. Each implant was machined in diameter about 3mm, length of 8mm (5mm was threaded part and 3mm was flat part). Implants were prepared and divided into 2 groups according to the types of surface modification method used: 1st group (10 implant) remained without nano surface modification (control), 2nd group include (10 implant) etche

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Physics Of Fluids
Modeling the effects of slip on dipole–wall collision problems using a lattice Boltzmann equation method
...Show More Authors

We study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,

... Show More
View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation and Characterization of a Hierarchically Porous Zeolite-Carbon Composite from Economical Materials and Green Method
...Show More Authors