Preferred Language
Articles
/
bsj-2788
Development of Green Method for Trace Determination of Bendiocarb in Real Samples Using Emerson
...Show More Authors

In this study, cloud point extraction combined with molecular spectrometry as an eco-friendly method is used for extraction, enrichment and determination of bendiocarb (BC) insecticide in different complex matrices. The method involved an alkaline hydrolysis of BC followed Emerson reaction in which the resultant phenol is reacted with 4-aminoantipyrene(4-AAP) in the presence of an alkaline oxidant of potassium ferric cyanide to form red colored product which then extracted into micelles of Triton X-114 as a mediated extractant at room temperature. The extracted product in cloud point layer is separated from the aqueous layer by centrifugation for 20 min and dissolved in a minimum amount of a mixture ethanol: water (1:1) followed the determination of BC by using spectrophotometry at a wavelength maximum of 470 nm. The most important parameters affecting the extraction and determination of BC are conducted via a classical optimization. Under the optimum conditions established , Beer’s law is obeyed in the range of 0.1-4 µg mL-1 while the optimum concentration ranges estimated by Ringbom’s plot was of 0.4-2.12 µg mL-1. The enrichment factor was of 59.87 fold leading to achieve the limit of detection of 0.076 ?g mL-1. The proposed method gives superior sensitivity in terms of the molar absorptivity of 1.99x105 L mol-1 cm-1 and extraction efficiency of 98.0%. The established method is applied in the analysis of the spiked vegetables, orange, soil and water samples with appropriate concentration with BC standard.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On The Nearby-Tip Strain Investigation and Failure-Propability Evaluation for Impacted Thin Plates Using the 2-Random-Variables Multi-Canonical-Based Joint Propability Distributions
...Show More Authors

The study of the validity and probability of failure in solids and structures is highly considered as one of the most incredibly-highlighted study fields in many science and engineering applications, the design analysts must therefore seek to investigate the points where the failing strains may be occurred, the probabilities of which these strains can cause the existing cracks to propagate through the fractured medium considered, and thereafter the solutions by which the analysts can adopt the approachable techniques to reduce/arrest these propagating cracks.In the present study a theoretical investigation upon simply-supported thin plates having surface cracks within their structure is to be accomplished, and the applied impact load to the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space
...Show More Authors

      Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.

View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Thinking Styles And Its Relationship With The Need for Cognitive for Students of University
...Show More Authors

This study aims to recognize the most common thinking styles and level of the need for cognitive university students , the relation between thinking styles and the need for cognitive, and there are differences according to gender .The sample consists of (250) males and females university students for the academic year (2013-2014), and the researcher uses two scales;" thinking styles scale (Harison &Bramson, 1986), and the need for cognitive scale" (Cacioppo, Petty & Kao , 1996).
The results show that there is difference in the range of the prevalence of the thinking styles among university students , the scientific thinking style is the most common , the students have got the arrange level of the need for cognitive , and there

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 20 2018
Journal Name
Al-adab Journal
An Evaluation of the "English for Iraq" Course for the Fifth Grade Secondary Schools
...Show More Authors

Providing Iraqi students with proficiency in English is the ultimate goal of the educational system which is a way of getting knowledge in the fields of arts, sciences, transferring knowledge and sciences to other communities. Therefore, conducting such a type of study is very important because the contents of English textbooks have a huge influence on learning of the students. Once the content of English textbooks contain errors as the correct one, this will effect on his/her learning. The present study is an attempt to evaluate the new course entitled “English for Iraq” for fifth grade students for secondary schools, by Olivia Johnston and Mark Farell. It aims to answer eleven questions relating to the following domains: strength, obj

... Show More
View Publication
Crossref
Publication Date
Wed Jul 13 2016
Journal Name
International Journal Of Mathematics Trends And Technology
Designed Algorithms for Compute the Tenser Product of Representation for the Special Linear Groups
...Show More Authors

The main objective of this paper is to designed algorithms and implemented in the construction of the main program designated for the determination the tenser product of representation for the special linear group.

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Colloid And Interface Science
Organic acid concentration thresholds for ageing of carbonate minerals: Implications for CO2 trapping/storage
...Show More Authors

Hypothesis CO2 geological storage (CGS) involves different mechanisms which can store millions of tonnes of CO2 per year in depleted hydrocarbon reservoirs and deep saline aquifers. But their storage capacity is influenced by the presence of different carboxylic compounds in the reservoir. These molecules strongly affect the water wetness of the rock, which has a dramatic impact on storage capacities and containment security. However, precise understanding of how these carboxylic acids influence the rock’s CO2-wettability is lacking. Experiments We thus systematically analysed these relationships as a function of pressure, temperature, storage depth and organic acid concentrations. A particular focus was on identifying organic acid conce

... Show More
Scopus (119)
Crossref (116)
Scopus Clarivate Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Oral Contraceptive Pill on Cortical Thickness and Bone Mineral Density of The Mandibular Mental and Gonial Regions in Premenopausal Females Using Spiral Computed Tomography
...Show More Authors

Background: Prolonged use of low-dose estrogen ''20 micrograms or less" Combined oral contraceptive pill (that have estrogen and progesterone steroid hormone) had an effect on bone turnover .Bone mineral density is used in clinical medicine as an indirect indicator of osteoporosis and fracture risk. The aim of the study: The aim of this study was to investigate the effect of low dose oral contraceptive pill on the cortical thickness (in millimeter) and bone mineral density at the mandibular cortex of mental and gonial regions in Hounsfield unit(HU) using spiral computed tomography. Material and method: This prospective study was conducted on computed tomographic image of 100 women aged between (20-40) years .The collected sample includes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Journal Of Engineering
3-D Object Recognition using Multi-Wavelet and Neural Network
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com

... Show More
View Publication
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
3-D OBJECT RECOGNITION USING MULTI-WAVELET AND NEURAL NETWORK
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 10 2012
Journal Name
الدنانير
Cryptography Using Artificial Neural Network
...Show More Authors

Neural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.

Preview PDF