Preferred Language
Articles
/
bijps-503
Validity of Generalized Standard Addition Method for a Mixture of Amino Acid Analysis
...Show More Authors

A Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine   (Arg) and glycine ( Gly) in arginine  acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed method is accurate, precise, and free from interferences and may provide a useful approach to calibrate in the direct analysis of solid sample and it is suitable method to be used as a quality control procedure.

Key words: GSAM , amino acid analysis

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE ROLE OF SPECIFIC AMINO ACIDS IN THE PROTECTION OF E. COLI AGAINST B-LACTAM ANTIBIOTICS IN VITRO
...Show More Authors

The role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro In minimal medium, cells were treated with 32 ug/ml of penicillin G, carbenciLlin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementation. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and sephalotin. Deletion of methionine or asparagine abolished the protection against carbencillin and to a less extent cephalotin.

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Inorganic Chemistry Communications
Synthesis, characterization, and bioactivity of several metal complexes of (4-Amino-N-(5-methyl-isaxazol-3-yl)-benzenesulfonamide)
...Show More Authors

View Publication
Scopus (28)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Simultaneous Determination of Piroxicam and Codeine Phosphate Hemihydrate in a Pharmaceutical Dosage Form Using Validated HPLC Method
...Show More Authors

An easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Nordhaus-Gaddum Type Relations on Open Support Independence Number of Some Path Related Graphs Under Addition and Multiplication
...Show More Authors

In this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 04 2015
Journal Name
International Journal Of Advanced Technology In Engineering And Science
SYNTHESIS OF ZNO QUANTUM DOT BY SELF ASSEMBLY METHOD AND ZNO NANOROD BY HYDROTHERMAL METHOD
...Show More Authors

In this work, ZnO quantum dots (Q.dots) and nanorods were prepared. ZnO quantum dots were prepared by self-assembly method of zinc acetate solution with KOH solution, while ZnO nanorods were prepared by hydrothermal method of zinc nitrate hexahydrate Zn (NO3)2.6H2O with hexamethy lenetetramin (HMT) C6H12N4. The optical , structural and spectroscopic properties of the product quantum dot were studied. The results show the dependence of the optical properties on the crystal dimension and the formation of the trap states in the energy band gap. The deep levels emission was studied for n-ZnO and p-ZnO. The preparation ZnO nanorods show semiconductor behavior of p-type, which is a difficult process by doping because native defects.

Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Colloid Interface Science
Corrigendum to “Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage” [J. Colloid Interface Sci. 534 (2019) 88–94]
...Show More Authors

Erratum for Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage.

Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of applying assurance engagements according to the international standard IASE (3402) in enhancing the auditing action
...Show More Authors

Abstract:
                The research seeks to explain the role of the international auditing standard (3402) in the auditor's procedures, where the importance of the research stems from the adoption of international auditing standards in the Iraqi environment, including the standard (3402) of assurance engagements that the external auditor performs by submitting reports on the design of control tools and their operational effectiveness in a service facility that provides the beneficiaries with a service. To provide useful information for service organizations The control tools are of great benefit in rationalizing decisions, and many recommen

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Implementing of Social Responsibility Standard ISO 26000 in Consumer Issues Market: Research and Consumer Protection Center -Study Case
...Show More Authors

Abstract The aim of this research is to show the grade of implementation of ISO 26000 (Social Responsibility Standard), specifically which related in clause sex (consumer issues), this study was achieved in Market Research and Consumer Protection Center (MRCPC) / University of Baghdad. The seven consumer issues of ISO 26000 was analyzed to show the extent of its implementation in MRCPC depending of using a check list as a principle instrument to collect research data and information. Results analysis was achieved by percentages and mean average. The research was leaded some of results and the most importance one was that the grade of implementation of the center in related to consumer issues given in the standard was medium

View Publication Preview PDF
Crossref