A UV-Vis spectrophotometry method was developed for the determination of metoclopramide hydrochloride in pure and several pharmaceutical preparations, such as Permosan tablets, Meclodin syrups, and Plasil ampoules. The method is based on the diazotization reaction of metoclopramide hydrochloride with sodium nitrate and hydrochloric acid to yield the diazonium salt, which is then reacted with 3,5-dimethyl phenol in the presence of sodium hydroxide to form a yellow azo dye. Calibration curves were linear in the range from 0.3 to 6.5 µg/mL, with a correlation coefficient of 0.9993. The limits of detection and quantification were determined and found to be 0.18 and 0.61 µg/mL, respectively. Accuracy and precision were also determined by calculating the relative error, relative standard deviation, and recoveries. No interference was found from additive substances in pharmaceutical preparations. The proposed method has been successfully applied to determine metoclopramide hydrochloride concentrations in different pharmaceutical formulation samples.
This study aims to the little impact of accounting financial performance (AFP) analysis on the money market in the Iraqi economy. Potentially limiting future market activity could be international risks and obstacles, which in turn could cause issues and crises (Shah & Jan, 2014; Bakhtiyarovich, 2020). The study concept was inspired by the recognition that there must be communication between the importance of the AFP analysis of the Iraqi securities market and the country’s financial and economic institutions. The sample of the study included ten Iraqi banks listed in the Iraq Stock Exchange (ISE) for the period 2010–2020. The three mathematical models included in the statistical analysis served as the basis for projectin
... Show MoreTheater is a renewed art until this moment, and it does not stray from its components from life and its spaces in general, but rather is derived from them according to characteristics and directions intended to differ based on finding other, more effective solutions, Therefore, the research entitled (Extractive treatments of the space between tradition and contrast in contemporary theater) consists of four chapters. The first chapter came under the title (the methodological framework). Where he dealt with the research problem and then the importance of the research and the goal of the research as well as the objective, temporal and spatial limits of the research, In addition to defining the terminology and then finding the procedural ter
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreElectrocoagulation is an electrochemical method for treatment of different types of wastewater whereby sacrificial anodes corrode to release active coagulant (usually aluminium or iron cations) into solution, while simultaneous evolution of hydrogen at the cathode allows for pollutant removal by flotation or settling. The Taguchi method was applied as an experimental design and to determine the best conditions for chromium (VI) removal from wastewater. Various parameters in a batch stirred tank by iron metal electrodes: pH, initial chromium concentration, current density, distance between electrodes and KCl concentration were investigated, and the results have been analyzed using signal-to-noise (S/N) ratio. It was found that the r
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe general budget is usually linked to the role of the state in public life and economic activity, whether this role is neutral or interventionist and thus reflects the general objectives that the state seeks to achieve.
for importance of the public budget in clarifying the image of the political state philosophy and its objectives it seeks to achieve on the one hand and clarifying the degree and rank it occupies in the ladder of development among the other countries. This study is intended to highlight the concepts of the general budget and how its concept has evolved since the Middle Ages. Of the importance of the general budget in Iraq was not based on scientific and objective and then the study
... Show More