A simple, precise, and sensitive spectrophotometric method has been established for the analysis of doxycycline. The method includes direct charge transfer complexation of doxycycline withp-Bromanil in acetonitrileto form a colored complex. The intensely colored product formed was quantified based on the absorption band at 377 nm under optimum condition. Beer’s law is obeyed in the concentration range of 1–50 μg.mL-1 with molar absorptivity of 1.5725x104 L.mol-1.cm-1, Sandell's sensitivity index (0.0283) μg.cm-2, detection limit of 0.1064 μg.mL-1, quantification limit 0.3224 μg.mL-1 and association constant of the formed complex (0.75x103). The developed method could find application in routine quality control of doxycycline and has been successfully applied for the determination of the cited drug in commercial formulations (capsules) with good accuracy and precision and without a detectable interference from common excipients.
Abstract: The aim of the present work is to measure radon concentration in wood. Solid state nuclear track detectors of type CR – 39 was used as measurement device. Eight different samples of imported and local wood were collected from markets. Samples were grinded, dried in order to measure radon concentrations in it. Cylindrical diffusion tube was used as detection technique. Results show that the higher concentration was in Iraqi sample 1 which recorded (14.02 ± 0.9) Bq / m3, while the less was in Emirates Sample which recorded (5.35 ± 1.2) Bq / m3. From the present work, all wood samples were with lowest concentrations of radon gas than other building materials.
This paper investigates the interaction between fiscal and monetary policy in Iraq after 2003 using the prisoner’s dilemma.The paper aims to determine the best form of coordination between these policies to achieve their goals; payoff matrix for both policies was constructed. To achieve the purpose, the quantitative approach was applied using several methods, including regression, building payoff matrices and decision analysis using a number of software.The results of the monetary policy payment function show that inflation rate has an inverse relationship with the auctions of selling foreign currency and a positive relationship with the government’s activity, while the fiscal policy function shows that real growth is positively
... Show MoreIraq suffers the continuing lack of water resources in generdwether it is surface or underearth water or rain. The study of rain has got the utmost importance in order to the rain direction in Iraq and in Mosul in particular and what it will be in future. It also shows the wet as well as the dry seasons and the possibility of expecting them and expecting their quantities in order to invest them and to keep this vital resource The research deals with predict the wet and dry rainy seasons in Mosul using (SPI) Standardized precipitation index extracted from conversion of Gamma distribution to standardized normal distribution , depending on data of monthly rain amounts for 1940-2013 . Results showed existence of 31 w
... Show MoreIn this research, the one of the most important model and widely used in many and applications is linear mixed model, which widely used to analysis the longitudinal data that characterized by the repeated measures form .where estimating linear mixed model by using two methods (parametric and nonparametric) and used to estimate the conditional mean and marginal mean in linear mixed model ,A comparison between number of models is made to get the best model that will represent the mean wind speed in Iraq.The application is concerned with 8 meteorological stations in Iraq that we selected randomly and then we take a monthly data about wind speed over ten years Then average it over each month in corresponding year, so we g
... Show MoreEpilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreToday, Unmanned Aerial Vehicles (UAVs) or Drones are a valuable source of data on inspection, surveillance, mapping and 3D modelling matters. Drones can be considered as the new alternative of classic manned aerial photography due to their low cost and high spatial resolution. In this study, drones were used to study archaeological sites. The archaeological Nineveh site, which is a very famous site located in heart of the city of Mosul, in northern Iraq, was chosen. This site was the largest capital of the Assyrian Empire 3000 years ago. The site contains an external wall that includes many gates, most of which were destroyed when Daesh occupied the city in 2014. The local population of the city of Mosul has also large
... Show MoreInformation centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show MoreClimate and hydrological conditions in any hydrological basin are multi-combined reflection of natural factors of morphology and soil nature, as well as the changing in climate factors that affect directly on hydrological cycle. Water balance techniques are a means of solution of important theoretical and practical hydrological problems, while estimating the physical properties of water-bearing layers is an essential part of groundwater studies. One of the most effective ways of determining these properties is to conduct and analyze aquifer tests. The aim of this research is to compare groundwater recharge in Khan Al-Baghdadi area which located to northwest of Anbar governorate in the west of Iraq, depending on meteorological water balan
... Show More