Preferred Language
Articles
/
bsj-4252
Spectrophotometer Determination of Cefixime in pure form and pharmaceutical preparation by Using Cloud point Extraction
...Show More Authors

Two simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using  Trtion X-114 as surfactant. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1. Sandell’s sensitivity was 0.1470μg∙cm-1, the detection limit was 0.06680μg∙mL-1, and the limit of quantitation was 0.07293μg∙mL-1. All variables including the reagent concentration, reaction time, colour stability period, and mole ratio were studied in order to optimize the reaction conditions. The composition of product (1:1). The methods were effectively useful to the determination of Cefixime in pharmaceutical dose form, and the attained results were in good agreement with the official result and other methods in literature .No interference was observed from the commonly encountered additives and excipients

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising
...Show More Authors

Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .

                In this paper  a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering  and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
Determination of radioactive concentrations in Tigris river soil samples in Baghdad province
...Show More Authors

In this study, the amounts of activity concentrations of naturally occurring in 10 soil samples of the Tigris river and surrounding areas collected from deferent city of Baghdad have been investigated. Tigris river is an important water source for irrigation and drinking in Iraq. This study was done during 2018 in Protection Center of the Iraqi Ministry of Health and Environment using a high purity germanium detector. The resolution of (HPGe) at 2keV and 30% efficiency. The results of soil sample obtained showed that the effective activity concentration of 40K are ranged from 181.4 Bq/kg in sample S6 to 286.4 Bq/kg in S7. For Raeq values are ranged from 6 Bq/m3 in sample S5 to 17 Bq/m3 in sample S3. The obtained data revealed that the me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Synthesis of several Urea plast Resins using Different Aldehydes Preparation of some Alkyde Resins and Empolyment of the prepared Resins as Additives for AZO Dyes
...Show More Authors

Urea formaldehyde resin was prepared by using basic media by yield 95%. The Remaining of ureaplasts resin were prepared in acetic acid media by high yield. Alkyde resins were prepared by condensation polymerization by react Succinic, Maleic, Phthalic anhydrides with Ethylene glycol or Glycerol. Select samples of the prepared alkyde resins were mixed with Azo dyes in special ratio. The mixtures were used as coatings for wood, and compaised with pure dyes. The Coating that some alkyde resins showed better adhesion from using dyes alone. Preparation of wood coating by mixing ureaplast resins and alkyde resins with Azo dyes in special ratios. The coating showed better adhesion, brighter colors and better resistance to heat from Preceding coat

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Civil Engineering And Technology
Generalized tupled common fixed point theorems for weakly compatible mappings in fuzzy metric space
...Show More Authors

Scopus (11)
Scopus
Publication Date
Wed Jun 16 2021
Journal Name
Biochemical And Cellular Archives
Synthesis, characterization and pharmaceutical studies of schiff base from 2-pyrrolidinone derivative and imidazole-2-carboxaldehyde and corresponding complexes with Metal (||)
...Show More Authors

Synthesis, characterization and pharmaceutical studies of schiff base from 2-pyrrolidinone derivative and imidazole-2-carboxaldehyde and corresponding complexes with Metal (||)

Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of American Science
Morphohistological study of the tongue in local mice species by using special stain
...Show More Authors

Preview PDF