A simple, sensitive and rapid method was used for the estimate of: Propranolol with Bi (III) to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on a reaction between propranolol and Bi (III) in an aqueous medium to obtain a yellow precipitate. Optimum parameters were studied to increase the sensitivity for the developed method. A linear range for calibration graph was 0.1-25 mmol/L for cell A and 1-40 mmol/L for cell B, and LOD 51.8698 ng/200 µL and 363.0886 ng /200 µL , respectively to cell A and cell B with correlation coefficient (r) 0.9975 for cell A, 0.9966 for cell B, RSD% was lower than 1%, (n = 8) for the determination of propranolol at concentration (0.5,10 and 25) mmol/L, respectively to cell A and cell B. Results were compared with classical methods UV-Spectrophotometric at λ max = 289 nm and turbidimetric method by using standard addition method via t-test at 95% level confidence. The comparison of data explains that long-distance chasing photometer (NAG-ADF-300-2) is the choice with extended stellar detection and broad application.
The measurements and tests of the samples conducted in the laboratories of the College of Agriculture included isolating bio-fertilizers and testing the efficiency of isolates that fix atmospheric nitrogen and solubilize phosphorous compounds. Bacteria were isolated and identified from the rhizosphere soils of different plants collected from various agricultural areas. A total of 74 bacterial isolates were obtained based on the phenotypic characteristics of the developing colonies, as well as biochemical and microscopic traits. The results of isolation and identification showed that among the 74 bacterial isolates, there were 15 isolates of A. chroococcum, 13 of Az. lipoferum, 13 of B. megaterium, 10 of P. putida, 10 of Actinomycetes, and n
... Show MoreThe goal of this research is to solve several one-dimensional partial differential equations in linear and nonlinear forms using a powerful approximate analytical approach. Many of these equations are difficult to find the exact solutions due to their governing equations. Therefore, examining and analyzing efficient approximate analytical approaches to treat these problems are required. In this work, the homotopy analysis method (HAM) is proposed. We use convergence control parameters to optimize the approximate solution. This method relay on choosing with complete freedom an auxiliary function linear operator and initial guess to generate the series solution. Moreover, the method gives a convenient way to guarantee the converge
... Show MoreIn this work we define and study new concept of fibrewise topological spaces, namely fibrewise soft topological spaces, Also, we introduce the concepts of fibrewise closed soft topological spaces, fibrewise open soft topological spaces, fibrewise soft near compact spaces and fibrewise locally soft near compact spaces.
The contemporary ideas were characterized by the abundance and diversity of their knowledge, human and conceptual production, the strategy is both a general and a detailed framework covering all design disciplines both inside and outside the field of architecture. From here, many of these terraces emerged from fields outside the field of architecture, but soon moved to form an important nerve within the field of architecture. Hence the need to define a more comprehensive framework for studying one of the concepts that can frame the framework, namely the concept of "Alliteration", and its adoption as an architectural design strategy aimed at giving the resulting form a feature of rhetoric. So the research highlighted the
... Show MoreThe current research aims to identify the impact of the amputated story style in the collection of sixth graders in elementary in the written expression subject.
The researcher, intentionally, chose Al-Ameen primary hybrid school which belongs to the directorate of education in Baghdad / Karkh first. The number of people of the sixth grade three classes. The researcher chose the two classes randomly to represent one of the experimental group, the number (32) pupils (male and female) have studied the expression subject by the amputated story style. Other control group, the number (32) pupils studied according to the traditional method.
The researcher prepared the lesson plans and presented to the experts, the researc
... Show MoreThis study aimed to extract, purify, and characterize the protease of local Okra Abelmoschus esculentus pods. The extraction process was conducted using ten extraction solutions with different pH and ionic strength values. Phosphate buffer solution with (pH 7, 0.05M, containing 2% sodium chloride) gave the highest activity which was (7.2 Unit/ml) as compared to other solutions, which ranged from 0.8-5.9 Unit/ml. The extracted enzyme purified by several stages. Being, precipitation by gradual addition of Ammonium sulphate from 20 to 85% saturation, then the precipitated enzyme was dialyzed and fractionated through DEAE-Cellulose (22X1.1cm), the enzymic fractions were pooled. The specific activity, purification fold and the enzyme yield value
... Show MoreIn this paper, we study the concepts of generalized reverse derivation, Jordan
generalized reverse derivation and Jordan generalized triple reverse derivation on -
ring M. The aim of this paper is to prove that every Jordan generalized reverse
derivation of -ring M is generalized reverse derivation of M.
Abstract of the research:
This research sheds light on an important phenomenon in our Arabic language, which is linguistic sediments, and by which we mean a group of vocabulary that falls out of use and that native speakers no longer use it, and at the same time it happens that few individuals preserve the phenomenon and use it in their lives, and it is one of the most important phenomena that It should be undertaken and studied by researchers; Because it is at the heart of our huge linguistic heritage, as colloquial Arabic dialects retain a lot of linguistic sediments, and we usually find them at all levels of language: phonetic, banking, grammatical and semantic. In the
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs