Preferred Language
Articles
/
Fhdns44BVTCNdQwCsFcQ
Simple and Rapid Method For Estimate of Propranolol With Bi (III) Via Long-Distance Chasing Photometer (NAG-ADF-300-2) Utilization Continuous Flow Injection Analysis
...Show More Authors

A simple, sensitive and rapid method was used for the estimate of: Propranolol with Bi (III) to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on a reaction between propranolol and Bi (III) in an aqueous medium to obtain a yellow precipitate. Optimum parameters were studied to increase the sensitivity for the developed method. A linear range for calibration graph was 0.1-25 mmol/L for cell A and 1-40 mmol/L for cell B, and LOD 51.8698 ng/200 µL and 363.0886 ng /200 µL , respectively to cell A and cell B with correlation coefficient (r) 0.9975 for cell A, 0.9966 for cell B, RSD% was lower than 1%, (n = 8) for the determination of propranolol at concentration (0.5,10 and 25) mmol/L, respectively to cell A and cell B. Results were compared with classical methods UV-Spectrophotometric at λ max = 289 nm and turbidimetric method by using standard addition method via t-test at 95% level confidence. The comparison of data explains that long-distance chasing photometer (NAG-ADF-300-2) is the choice with extended stellar detection and broad application.

Publication Date
Fri Sep 09 2022
Journal Name
Revista Mexicana De Oftalmología (english Edition)
Posterior subtenon triamcinolone acetonide combined with phacoemulsification for patients with diabetic maculopathy
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the structure of salaries of public sector workers for strategic planning purposes An analytical study in the general body of groundwater
...Show More Authors

The research discusses the problem of salaries in the public sector in terms of the process of analyzing its structure and the possibility of benefiting from the information provided by the analysis process for the strategic planning process, and the General Authority for Groundwater has been adopted and one of the formations of the Ministry of Water Resources, which is centrally funded, to represent the salary structure of its employees (1117) employees be a field of research, as the salary structure in it was analyzed for the period between (2014-2019) using the quantitative approach to analysis and by relying on a number of statistical tools in the analysis process, including mathematical circles, upper limits, lower limits, p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The Dental Caries Experience in Relation to Salivary Flow Rate, SIgA and Mutans Streptococci Bacteria in Smoker and Non-Smoker Patients
...Show More Authors

Background: Dental caries is a localized, progressive destructive, largely irreversible microbial based disease of multifactorial nature; these factors include (host, microbes and food) they influence differently on the initiation and progression of dental caries. The aims of the study: was to evaluate the effect of smoking on salivary flow rate, secretory immunoglobulin (SIgA) level and viable count of mutans streptococci (M.S) bacteria in oral cavity and their relation to dental caries experience. Material and method: The samples were collected from 80 male students ranging in ages from 18-22 years old. Where they divided in to two groups, 40 non-smokers (control group) and 40 smokers (study group). Unstimulated salivary samples were c

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Stress Analysis of Spiral Bevel Gear Drives
...Show More Authors

This paper presents numerical and experimental stress analyses to evaluate the contact and bending stresses on the teeth of spiral bevel gear drive. Finite Element Method has been adopted as a numerical technique which accomplished basically by using ANSYS software package. The experimental stress analysis has been achieved by using a gear tooth model made of Castolite material which has photoelastic properties. The main goal of this research is detecting the maximum tooth stresses to avoid the severe areas that caused tooth failure and to increase the working life for this type of gear drives.

 

 

View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The problem of elevating the status of values in scienceStudy in economic thought and macro analysis
...Show More Authors

ان من اهم القضايا التي تثيرها المعرفة البشرية في تجلياتها، وتعبيراتها المفاهيمية، تكمن في مدى تأصلها وانتمائها الى البنى والتشكيلات الموضوعية (في مستوياتها التاريخية) التي تسعى لتفسيرها وادراكها ومضاهاتها. فالينبوع الذي يغرف منه الفكر مادته هو الكيان الاجتماعي المتموضع خارج الوعي والايدولوجيا.

ان قدرة الوعي على ادراك الواقع الموضوعي بخصائصه العامة يشكل الشرط  الضروري لاكتساب الوعي ل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of material flow cost accounting in reducing the cost of products - an applied study in Diyala State Company
...Show More Authors

Abstract

              The current research sought to demonstrate the effect of material flow cost accounting on reducing products through the application of material flow cost accounting technique, which works on the optimal utilization of materials and energy and the reduction of environmental impacts.The research aims to clarify the knowledge foundations for material flow cost accounting, in addition to studying the material flow cost accounting technique that helps reduce the cost of products and make them environmentally friendly. To achieve this, the research relied on the descriptive approach with regard to the theoretical aspect of the resea

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Environmental Nanotechnology Monitoring & Management
Green approach for the synthesis of graphene glass hybrid as a reactive barrier for remediation of groundwater contaminated with lead and tetracycline
...Show More Authors

Scopus (21)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref