Preferred Language
Articles
/
bijps-344
Spectrophotometric Determination of Nitrofurantoin Drug in its Pharmaceutical Formulations Using MBTH as a Coupling Reagent
...Show More Authors

A direct, sensitive and efficient spectrophotometric method for the determination of nitrofurantoin
drug (NIT) in pure as well as in dosage form (capsules) was described. The suggested method was
based on reduction NIT drug using Zn/HCl and then coupling with 3-methyl-2-benzothiazolinone
hydrazone hydrochloride (MBTH) in the presence of ammonium ceric sulfate. Spectrophotometric
measurement was established by recording the absorbance of the green colored product at 610 nm.
Using the optimized reaction conditions, beer’s law was obeyed in the range of 0.5-30 μg/mL, with
good correlation coefficient of 0.9998 and limits of detection and quantitation of 0.163 and 0.544
μg/mL, respectively. The accuracy and precision of the proposed method represented by recovery and
relative standard deviation were satisfactory; about 99.33% and 1.16%, respectively. The proposed
method was applied for determination of NIT in its pharmaceutical forms and the results compared
successfully with those obtained by standard method (British pharmacopeia method).
Keywords: Nitrofurantoin , MBTH , Oxidative coupling reaction.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Improvement the corrosion Behavior of Titanium by Nanotubular Oxide in a simulated saliva solution
...Show More Authors
Abstract<p>The corrosion behavior of Titanium in a simulated saliva solution was improved by Nanotubular Oxide via electrochemical anodizing treatment using three electrodes cell potentiostat at 37°C. The anodization treatment was achieved in a non-aqueous electrolyte with the following composition: 200mL ethylene glycol containing 0.6g NH4F and 10 ml of deionized water and using different applied directed voltage at 10°C and constant time of anodizing (15 min.). The anodized titanium layer was examined using SEM, and AFM technique.</p><p>The results showed that increasing applied voltage resulted in formation titanium oxide nanotubes with higher corrosion resistance </p> ... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Thu May 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Interleukine-6 Level in Saliva of Patients with Chronic Periodontitis: A Case-Control Study
...Show More Authors

Background:Periodontal diseases are infectious diseases in which periodontalpathogens trigger chronic inflammatory and immune responses. Interleukine-6 is a multifunctional cytokine playing a central role in inflammation and tissue injury.The aim of the study IS to determine the level of Interleukin-6(IL-6) in saliva of patients with chronic periodontitis compared to healthy subjects. Materials and Methods:The total subjects of the present study is 60, divided into 3 groups; 20 patients with chronic periodontitis with pocket depth(PD ≥4 mm)(group I), 20 patients with pocket depth(PD <4 mm) with clinical attachment loss (group II), and 20 healthy controls with pocket probing depth (PPD ≤ 3 mm) without clinical attachment loss (g

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Sep 24 2024
Journal Name
Arab World English Journal
A Critical Discourse Analysis of Women’s Representation in Maysaloon Hadi’s Novel The Black Eyes
...Show More Authors

This study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Use of Gis for Creating a Project Management Data Base in Baghdad Al-Rissfa
...Show More Authors

The main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2023
Journal Name
International Journal Of Professional Business Review
Is It Possible To Adopt A Budget Of Performance In The Iraqi Government Companies?
...Show More Authors

Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met.   Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Article Structural violence: A study In Johann Galtung's theory of explanation he violence t
...Show More Authors

This study deals with the subject of violence, but from another perspective, it has not been emphasized in contemporary studies of violence in Arabic and raqi universities, which is the structural or institutional aspect of violence. Traditional studies have focused their analysis of violence on the direct side the violence, The other side of the violence is the hidden violence, which is characterized by a lack of clarity of the underlying factors and its effects are not arises, which makes it the most serious violence, which requires a deep research into the social, political, economic, cultural and psychological structure of society (individuals and institutions). This study was based on the theory of the Norwegian scientist (J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
A Molecular Investigation of Phytoplasma (Candidatus Phytoplasma) Infecting Arabic Jasmine (Jasminum sambac) in Iraq
...Show More Authors

This study was conducted to investigate phytoplasma causing a virescence disease on Arabic jasmine Jasminum sambac based on microscopy and molecular approaches. Samples were collected from symptomatic Arabic jasmine plants grown in nurseries in Baghdad-Iraq. Specimens from infected plants were prepared and Dienes stained for light microscopy examination. Phytoplasma were detected in infected plants by polymerase chain reaction (PCR) using P1/P7 and SecAfor1/SecArev3 Candidatus Phytoplasma specific primer sets. Light microscopy test showed symptomatic Arabic jasmine plants were phytoplasms infected when phloem tissues were stained with a dark blue color. PCR test confirmed the symptomatic plants were phytoplasms infected when SecAfor1/Sec

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2011
Journal Name
J Clin Exp Invest Www. Clinexpinvest. Org Vol
Oral zinc sulphate in treatment of patients with thallium poisoning: A clinical therapeutic trial
...Show More Authors

KE Sharquie, KI Al-Hamdi, AA Noaimi, AA Al-Mohammadi, J Clin Exp Invest www. clinexpinvest. org Vol, 2011 - Cited by 1

View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref