Preferred Language
Articles
/
PRh52ZYBVTCNdQwCtof3
Simultaneous spectrophotometric method for determination of both ciprofloxacin and cephalexin by using H-point standard addition method
...Show More Authors

طريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين  في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من  السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مختلفة من السيفاليكسين 6-18 مايكروغرام . مل-1  في مزيج لهما. اظهرت النتائج عدم وجود اي تداخلات من قبل المواد المضافة التي تحتويها الادوية على هذه المركبات وضمن حدود كشف  السبروفلوكساسين يساوي 0.1732 مايكروغرام . مل-1  وعقارالسيفاليكسين  يساوي 0.4620  مايكروغرام . مل-1 . الانحراف القياسي النسبي المئوي اقل من 2% . تم تطبيق الطريقة بنجاح لتقدير العقارين في بعض المستحضرات الصيدلانية. تعتبر الطريقة المقترحة من الطرق القليلة التكلفة وعدم حاجتها الى ادخال الادوية في سلسلة من التفاعلات وتثبيت لظروف التفاعل لغرض تقديرها وانما تتم عن طريق تقدير الدواء بعد اذابته مباشرة في الماء المقطر بوجود العقار الاخر معه في مزيج وتعتبر من الطرق الناجحة في التقدير خاصة للادوية المتقاربة في طيف الامتصاص لها والتي من غير الممكن ايجاد طرق لفصل الدوائين وتقديرهما بصورة ادق من هذه الطريقة المقترحة دون التداخل وتاثير احدهما على الاخر. الطريقة المقترحة في هذا البحث كانت ناجحة في تقدير كل من السبروفلوكساسين والسيفاليكسين في مزيج لهما دون تداخل دواء مع الاخر.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 31 2024
Journal Name
Journal Of Optics
Novel characteristics of CQDs synthesized by electrochemical method
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
3-D Map Producing for Groundwater Level using Kriging Interpolation Method
...Show More Authors

The effect of the initial pressure upon the laminar flame speed, for a methane-air mixtures, has been detected paractically, for a wide range of equivalence ratio. In this work, a measurement system is designed in order to measure the laminar flame speed using a constant volume method with a thermocouples technique. The laminar  burning velocity is measured, by using the density ratio method. The comparison of the present work results and the previous ones show good agreement between them. This indicates that the measurements and the calculations employed in the present work are successful and precise

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Numerical Solution for Linear State Space Systems using Haar Wavelets Method
...Show More Authors

In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.

View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An efficient method for stamps recognition using Haar wavelet sub-bands
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Sep 05 2014
Journal Name
Engineering And Technology Journal
New Method to Increase the Ability of the Water for Dissolving Total Salts in Soil by Using the Magnetism
...Show More Authors

Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Petroleum Research And Studies
Modeling of Oil Viscosity for Southern Iraqi Reservoirs using Neural Network Method
...Show More Authors

The calculation of the oil density is more complex due to a wide range of pressuresand temperatures, which are always determined by specific conditions, pressure andtemperature. Therefore, the calculations that depend on oil components are moreaccurate and easier in finding such kind of requirements. The analyses of twenty liveoil samples are utilized. The three parameters Peng Robinson equation of state istuned to get match between measured and calculated oil viscosity. The Lohrenz-Bray-Clark (LBC) viscosity calculation technique is adopted to calculate the viscosity of oilfrom the given composition, pressure and temperature for 20 samples. The tunedequation of state is used to generate oil viscosity values for a range of temperatu

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Aug 06 2018
Journal Name
Indian Journal Of Applied Research
STATISTICAL METHOD FOR SOLVING TRANSPORTATION PROBLEMS OF USING THE PROGRAMMING LANGUAGE MATLAB
...Show More Authors

Original Research Paper Mathematics 1-Introduction : In the light of the progress and rapid development of the applications of research in applications fields, the need to rely on scientific tools and cleaner for data processing has become a prominent role in the resolution of decisions in industrial and service institutions according to the real need of these methods to make them scientific methods to solve the problem Making decisions for the purpose of making the departments succeed in performing their planning and executive tasks. Therefore, we found it necessary to know the transport model in general and to use statistical methods to reach the optimal solution with the lowest possible costs in particular. And you know The Transportatio

... Show More
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Estimate missing value by use analyses of covariance method for split block-design
...Show More Authors

The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF