The purpose of this work is to concurrently estimate the UVvisible spectra of binary combinations of piroxicam and mefenamic acid using the chemometric approach. To create the model, spectral data from 73 samples (with wavelengths between 200 and 400 nm) were employed. A two-layer artificial neural network model was created, with two neurons in the output layer and fourteen neurons in the hidden layer. The model was trained to simulate the concentrations and spectra of piroxicam and mefenamic acid. For piroxicam and mefenamic acid, respectively, the Levenberg-Marquardt algorithm with feed-forward back-propagation learning produced root mean square errors of prediction of 0.1679 μg/mL and 0.1154 μg/mL, with coefficients of determination of 0.99730 and 0.99942, respectively. The suggested approach’s ease of use, affordability, and environmental friendliness make it a suitable replacement for the use of hazardous chemicals in the routine investigation of the selected drugs
A simple, economic, rapid, reliable, and stability-indicating high-performance liquid chromatography (HPLC) method has been developed and validated for the simultaneous determination of paracetamol (PCM) and caffeine (CF) in solid dosage form. The chromatographic separations were achieved with a Waters Symmetry® C18 column (5 μm, 4.6 × 150 mm), using a mixture of methanol and water (40:60, v/v) as a mobile phase, under isocratic elution mode with a flow rate of 0.8 mL/min, and ultraviolet (UV) detection was set at 264 nm. The oven temperature for the column was set and maintained at 35 °C. The method was validated according to International Conference on Harmonization (ICH) guidelines, and it demonstrated excellent linearity, wi
... Show MoreReinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o
In this research, the one of the most important model and widely used in many and applications is linear mixed model, which widely used to analysis the longitudinal data that characterized by the repeated measures form .where estimating linear mixed model by using two methods (parametric and nonparametric) and used to estimate the conditional mean and marginal mean in linear mixed model ,A comparison between number of models is made to get the best model that will represent the mean wind speed in Iraq.The application is concerned with 8 meteorological stations in Iraq that we selected randomly and then we take a monthly data about wind speed over ten years Then average it over each month in corresponding year, so we g
... Show MoreAluminum oxide (ALO) was grafted by acrylic acid monomer (AlO-AM) and then, it was polymerized to produce alumina grafted poly(acrylic acid) (AlO-AP). The prepared AlO-AM and AlO-AP were characterized by Fourier-transform infrared, differential scanning calorimetry , thermogravemetric analyzer and particle size distribution. Adsorption equilibrium isotherms, adsorption kinetics and thermodynamic studies of the batch adsorption process were used to examine the fundamental adsorption properties of phenol (P) and p-chlorophenol (PCP). The experimental equilibrium adsorption data were analyzed by three widely used two-parameters Langmuir, Freundlich and DubininRadushkevich isotherms. The maximum P and PCP adsorption capacities based on t
... Show MoreOur country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.
The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.
Aims:
The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi
... Show MorePower switches require snubbing networks for driving single – phase industrial heaters. Designing these networks, for controlling the maximum allowable rate of rise of anode current (di/dt) and excessive anode – cathode voltage rise (dv/dt) of power switching devices as thyristors and Triacs, is usually achieved using conventional methods like Time Constant Method (TCM), resonance Method (RM), and Runge-Kutta Method (RKM). In this paper an alternative design methodology using Fuzzy Logic Method (FLM) is proposed for designing the snubber network to control the voltage and current changes. Results of FLM, with fewer rules requirements, show the close similarity with those of conventional design methods in such a network of a Triac drivin
... Show More
In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two. The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More