Two simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using Trtion X-114 as surfactant. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1. Sandell’s sensitivity was 0.1470μg∙cm-1, the detection limit was 0.06680μg∙mL-1, and the limit of quantitation was 0.07293μg∙mL-1. All variables including the reagent concentration, reaction time, colour stability period, and mole ratio were studied in order to optimize the reaction conditions. The composition of product (1:1). The methods were effectively useful to the determination of Cefixime in pharmaceutical dose form, and the attained results were in good agreement with the official result and other methods in literature .No interference was observed from the commonly encountered additives and excipients
This study was performed on the Tigris River (Baghdad city section) during the period between December 2016 and December 2018 to assess seasonal variation in water quality using the Overall Index of Pollution (OIP). The OIP is one of the reliable tools for the assessment of surface water quality. To calculate OIP-values, eight parameters were measured ( pH, Dissolved Oxygen "DO", Biological Oxygen Demand "BOD", Total Dissolved Solid "TDS", Total Hardness "TH", calcium "Ca", Sulphate "SO4" and Alkalinity). The results showed the anthropogenic activities impact of Baghdad population that directly discharge of "inadequate treated" waste water to the river. OIP values were acceptable (1˃OIP˃ 1.7) in 2011, 2012, 2013 and 2018. However, in
... Show MoreThis researchpaper includes the incorporation of Alliin at various energy levels and angles
With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b
... Show MoreThe nuclear matter density distributions, elastic electron scattering charge formfactors and root-mean square (rms) proton, charge, neutron and matter radii arestudied for neutron-rich 6,8He and 19C nuclei and proton-rich 8B and 17Ne nuclei. Thelocal scale transformation (LST) are used to improve the performance radial wavefunction of harmonic-oscillator wave function in order to generate the long tailbehavior appeared in matter density distribution at high . A good agreement resultsare obtained for aforementioned quantities in the used model.
Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.
In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes
... Show MoreThis research aims to introduce a new technique-off-site and self-form segmental concrete masonry arches fabrication, without the need of construction formwork or centering. The innovative construction method in the current study encompasses two construction materials forms the self-form masonry arches, wedge-shape plain concrete voussoirs, and carbon fiber-reinforced polymer (CFRP) composites. The employment of CFRP fabrics was for two main reasons: bonding the voussoirs and forming the masonry arches. In addition, CFRP proved to be efficient for strengthening the extrados of the arch rings under service loadings. An experimental test was conducted on four sophisticated masonry arch specimens. The research parameters were the Keystone thic
... Show MoreThis research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o
... Show More