DBN Rashid, 2012 - Cited by 2
Evaluation of trace elements in Iraqi chewing gums are unavailable, particularly pollution of toxic elements, materials which change the values of PH in the Oral. Atomic Absorption Spectroscopy (AAS) were successfully employed to determine the concentration of 7 trace elements (essentially toxic and nonessential) and the PH, in thirteen different brands of chewing gum generally consumed in Iraq. Combined wet and dry digestion procedures were applied. Two types of heated graphite tubes were used, coated and uncoated tubes treated with tungsten solution. Result showed that Cu, Al and Zn were at very high levels in almost all brands whereas Mn was found to be high in brands A and O only.
Abstract
The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (
... Show MoreRapid, reproducible and accurate method has been developed for the assay for of mebendazol (MBZ) residual assay. The method is based on alkaline hydrolysis of MBZ with sodium hydroxide then oxidation with N-bromosuccinimide (NBS) followed by coupling with 4-Bromoaniline (4-BA) to yield a highly colored product absorbed at maximum 434 nm. Regression analysis of linearity range was found (0.6-2.8) µg.ml-1. The optimum conditions that affect the oxidation were studied. The developed method was found to be precise with mean value of relative standard deviation (1.153- 1.303) and accurate with relative error (-0.5940-1.7821) .The calculated molar absorptivity and sandal sensitivity values of (29825 L.mol-1.cm
... Show MoreRapid, reproducible and accurate method has been developed for the assay for of mebendazol (MBZ) residual assay. The method is based on alkaline hydrolysis of MBZ with sodium hydroxide then oxidation with N-bromosuccinimide (NBS) followed by coupling with 4-Bromoaniline (4-BA) to yield a highly colored product absorbed at maximum 434 nm. Regression analysis of linearity range was found (0.6-2.8) µg.ml-1. The optimum conditions that affect the oxidation were studied. The developed method was found to be precise with mean value of relative standard deviation (1.153- 1.303) and accurate with relative error (-0.5940-1.7821) .The calculated molar absorptivity and sandal sensitivity values of (29825 L.mol-1.cm-1), 0.0099 µg.cm-2 respe
... Show MoreOne of most the important compounds which have active hydrogen (substrate) is the thiols which used in a wide field in preparation of Mannich bases . A large number of Mannich bases have been prepared as a biologically active compound (pharmaceutical, pesticides, bactericidal, fungicidal and tuberculostatic) and in order to correlate their structure and reactivity with their pharmacological activity such as . It has been reported that the reaction is easily proceeded by using primary and secondary amine beside formaldehyde. But when we tried the reaction of thiols as substrate and formaldehyde and succinimide instead of amine, the reaction did not proceed to give Mannich base but product were methylenene – bis – sulfide . Mann
... Show MoreAutoría: Nuha Mohsin Dhahi. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 5, 2022. Artículo de Revista en Dialnet.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show Moreفي تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5