Doxycycline hyclate is an antibiotic drug with a broad‐spectrum activity against a variety of gram‐positive and gram‐negative bacteria and is frequently used as a pharmacological agent and as an effector molecule in an inducible gene expression system. A sensitive, reliable and fast spectrophotometric method for the determination of doxycycline hyclate in pure and pharmaceutical formulations has been developed using flow injection analysis (FIA) and batch procedures. The proposed method is based on the reaction between the chromogenic reagent (V4+) and doxycycline hyclate in a neutral medium, resulting in the formation of a yellow compound that shows maximum absorbance at 396 nm. In a batch procedure, the proposed method was validated over the concentration range of 1.0–80 μg mL−1 with a sampling frequency of 30/h, and commercial pharmaceutical samples were successfully determined. The proposed method was successfully adapted with an FIA system where the peak heights are proportionally connected to doxycycline hyclate over the concentration range of 25–400 μg mL−1 with a sampling frequency of 50/h. The limits of detection (LOD) and quantification (LOQ) were 0.9 and 10.44 μg mL−1 and 3.01 and 34.81 μg mL−1 for batch and FIA respectively. The samples were submitted to an HPLC analysis, and the outcomes demonstrated excellent agreement with the suggested procedures. The adopted FIA procedure allows fast monitoring of doxycycline hyclate in pharmaceutical formulations and it can be used for quality control purposes during the production processes of doxycycline hyclate.
Background: The timing of eruption of permanent teeth is of considerable importance to the dental health planning for diagnostic, preventive and therapeutic measures for children and teenagers. The purposes of this study were to determine timing of maxillary and mandibular permanent teeth emergence (except third molars) and to evaluate the effect nutritional status by anthropometric measures on the eruption time of permanent teeth, investigations had been done according to jaw and gender variations. Materials and Methods: This study was conducted among four to fifteen years old children and teenagers from kindergarten and schools in Basrah city in the south region of Iraq. The total sample composed of 1807 children and teenagers that were
... Show MoreThe research aims to determine the required rate of return according to the Fama and French five-factor model, after strengthening it by adding the indebtedness factor to build the Fama and French six-factor model FF6M-DLE. The effect of the indebtedness factor on the company's profitability and the real value of the ordinary shares calculated according to the (equivalent ascertainment) model and its suitability with the company's situation, and an analysis of the fluctuation between the market value and the real value of the ordinary stocks.
The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreA field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82
... Show MoreIn many areas, such as simulation, numerical analysis, computer programming, decision-making, entertainment, and coding, a random number input is required. The pseudo-random number uses its seed value. In this paper, a hybrid method for pseudo number generation is proposed using Linear Feedback Shift Registers (LFSR) and Linear Congruential Generator (LCG). The hybrid method for generating keys is proposed by merging technologies. In each method, a new large in key-space group of numbers were generated separately. Also, a higher level of secrecy is gained such that the internal numbers generated from LFSR are combined with LCG (The adoption of roots in non-linear iteration loops). LCG and LFSR are linear structures and outputs
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More