A new design of manifold flow injection (FI) coupling with a merging zone technique was studied for sulfamethoxazole determination spectrophotometrically. The semiautomated FI method has many advantages such as being fast, simple, highly accurate, economical with high throughput . The suggested method based on the production of the orange- colored compound of SMZ with (NQS)1,2-Naphthoquinone-4-Sulphonic acid Sodium salt in alkaline media NaOH at λmax 496nm.The linearity range of sulfamethoxazole was 3-100 μg. mL-1, with (LOD) was 0.593 μg. mL-1 and the RSD% is about 1.25 and the recovery is 100.73%. All various physical and chemical parameters that have an effect on the stability and development of the colored product were accurately studied and the designed systems have been completely implemented successfully for sulfamethoxazole quantity estimation in pharmaceutical formulations and biological samples.
The aim of the research is to highlight the income tax by direct deduction in Iraq and the most important problems and obstacles faced by this type of taxes and identify the reasons for the clear and striking differences in the deduction between those charged with the state departments to reach the exact calculation in accordance with the laws and instructions and the unification of tax deductions for similar cases and clarify Cases of confusion and ambiguity, and achieving justice by deduction, whether in favor of the taxpayer or financial authority. Under the laws and regulations in force.
The study was conducted on a sample of the salaries of the employees of the University of Basra, and interviews with account m
... Show MoreTwo simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using Trtion X-114 as surfactant. Beer
... Show MoreIn this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv an
... Show MoreSpatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.
Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp
... Show MoreThe study area comprises Injana Formation (Late Miocene), exposed on the hills nearby of Tharthar Lake and about 120 km north of Baghdad city. This study depends on sedimentologic and facies analysis to recognize paleoenvironment and recognize the kinds of vertebrate bone fossils during Late Miocene. Sedimentologic and facies analysis showed many sedimentary facies: facies (Se) of scoured erosional surface, facies of (Sp) cross- bedded sandstones, facies (Fs) of fine sandstone facies, facies of (Fc) claystone, and facies of (C) calcareous clay. Facies analysis referred to the sub environments which are: point bar, over bank and floodplain in addition to fining upward cycles of deposition, which refers to meandering flu
... Show MoreThe lower respiratory tract of sheep was studied to determine the torsion and branching of the bronchial tree. The respiratory system of ruminants and all living organisms is one of the most important organs in the body that controls the amount of gas exchange between the heart and lungs through the airways, it is clear that in sheep it consists of a narrow bronchial tube that reaches the extent of lung tissue repercussions. He used silicon, water, acid, and at room temperature, and the substance was injected with an injection gun through the trachea and was pushed gently to spread and distribute in all parts of the lungs with moderate manual pressure. The results showed that the mold shape in the lung and the bronchial branches of
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More