Preferred Language
Articles
/
6Bga3pYBVTCNdQwCMIeW
LC-MS/MS METHOD FOR THE DETERMINATION OF IMATINIB MESYLATE IN BLOOD PLASMA SAMPLES AFTER ADSORPTION BY COPPER TANNIC ACID
...Show More Authors

A novel metal-organic framework (MOF) sorbent based on tannic acid/copper (TA/Cu) was synthesized and characterized for the application of the anticancer drug imatinib (IMA) from biological samples. The TA/Cu MOF was prepared via a facile coordination reaction and thoroughly characterized by SEM, XRD, and FTIR techniques. Critical parameters influencing the extraction efficiency of imatinib mesylate (IMAM), including pH, ionic strength, desorption solvent, and adsorption-desorption time were optimized. With acetonitrile as the desorption solvent, the method demonstrated a broad linear range of 0.55-300 μg L-1 under ideal conditions. Limits of detection and quantification were found to be 0.16 μg L-1 and 0.55 μg L-1, respectively. For plasma samples spiked at clinically relevant concentrations (5, 20, and 50 μg L-1), the sorbent showed good reusability over four cycles and negligible matrix effects. In comparison to previously published methods, the developed dispersive solid phase extraction method based on TA/Cu MOF performed better in terms of simplicity, enrichment factor, and analytical figures. Another objective of this study was to develop a liquid chromatography with tandem mass spectrometry technique that could be commonly and readily used for therapeutic drug monitoring of imatinib following extraction by solid phase extraction (SPE). Therapeutic monitoring applications can reliably quantify IMA in complex biological matrices as a result of the fast dispersive solid phase extraction (DSPE) procedure and environmentally friendly sorbent. For citation: Russol Abdul Salam Faraj, Noor H.K., Saba H. Jamel, Jasim Jamur M.S. LC-MS/MS method for the determination of imatinib mesylate in blood plasma samples after adsorption by copper tannic acid. ChemChemTech [Izv. Vyssh. Uchebn. Zaved. Khim. Khim. Tekhnol.]. 2025. V. 68. N 3. P. 27-35. DOI: 10.6060/ivkkt.20256803.7121.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of electronic trading and central filing in the performance of the Iraq Stock Exchange for the period (2008-2018)
...Show More Authors

The rapid development of information technology and its use in all areas has had a positive impact on all areas, and financial markets have had a share of this development through the use of an electronic trading system to settle transactions, enhance transparency and disclosure in all activities of these markets and revitalize their performance.

The reason for choosing this topic is that it is a very important topic for what modern technology addresses in trading operations in financial markets. It is worth noting that these innovations have eliminated the need for direct contact with people, but through the Internet and telephone networks, and the new technology has reduced the costs of building systems

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of the Adoption of IFRS 17 “Insurance Contracts” on the Procedures for Auditing Insurance Contracts in the Iraqi Environment
...Show More Authors

          IFRS 17 aims to provide a unified basis for accounting for all types of insurance contracts, including reinsurance contracts, in a manner that benefits both investors and insurance companies and enhances the ability of the financial statements of insurance companies for comparison between companies listed in financial markets around the world. According to this standard, insurance contracts are accounted for on the basis of the Asset-Liability Approach and the use of fair values that the standard requires updating regularly in order to provide more useful information to the users of financial statements, as a result of the failure of reporting requirements for insurance contr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of Anticyclones Merge on the Temperature in the stations of Mosul, Baghdad and Basra for the Period (2005-2015)
...Show More Authors

           The Anticyclone Merge affects Iraq’s climate clearly through its impact on the different climatic elements. where it appears while they pass through special and distinctive weather . and most of this affection appears in temperatures, Therefore, this research study the relationship between the repetition and the survival period of the Anticyclone Merge and temperature average by using coefficient correlation (Pearson) that shows there’s strong inverse relationship between the integration of Anticyclones and temperatures average.                        &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of tax policy in the development of the Iraqi economy: (Applied Research for the period from 1995 to 2010)
...Show More Authors

The tax policy is an important tool of fiscal policy tools which is usedasits multiple tools the State seeks to achieve objectives, such as theachievement of economic development.The importance of the research comes from the importance ofeconomic development resulting from economic policies and prudent fiscaland appropriate to the economic situation of Iraq at the moment is the mostimportant tax policy that taxes one of the most important financial instruments.The research aims to clarify the role of tax policy in developing of theIraqi economy.In an effort to achieve the goals researchers tried to prove thehypothesis ((The tax policy and through multiple tools that seeks to contributeto the achievement of economic development in Iraq)).

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The Influence of The Kind of Feeding on The Average of Body Growth for The Infant of The Age (3-6) Months in Baghdad.City
...Show More Authors

This paper was conducted to identifying the body growth averages for the infants of the age (3-6) months and their relation with brest (natural ) or artificial feeding The results showed that the higher percentage was for the infants with the natural feeding in comparison with those of the artificial or mixed feeding. Also there was a clear increase in the average of the body growth for those with the natural feeding and such results were closer to the standard criterion. While the averages of body growth for those with the artificial or mixed feeding were low. In addition, it was clear that the averages of body growth of the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
ФОРМИРОВАНИЕ КОММУНИКАТИВНО-РЕЧЕВОЙ КОМПЕТЕНЦИИ СТУДЕНТОВ КАФЕДРЫ Р The formation of verbal communication for students of Russian Language Department at College of Languages at University of Baghdad by using multiple technological means
...Show More Authors

В статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции  в иракской аудитории с привлечением компьютерных технологий. Статья посвящена  использованию мультимедийных технологий  и  различных  приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Carbon Nanotubes: Synthesis via Flame Fragment Deposition (FFD) Method from Liquefied Petroleum Gas
...Show More Authors

The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref