A simple, sensitive and rapid method was used for the estimate of: Propranolol with Bi (III) to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on a reaction between propranolol and Bi (III) in an aqueous medium to obtain a yellow precipitate. Optimum parameters were studied to increase the sensitivity for the developed method. A linear range for calibration graph was 0.1-25 mmol/L for cell A and 1-40 mmol/L for cell B, and LOD 51.8698 ng/200 µL and 363.0886 ng /200 µL , respectively to cell A and cell B with correlation coefficient (r) 0.9975 for cell A, 0.9966 for cell B, RSD% was lower than 1%, (n = 8) for the determination of propranolol at concentration (0.5,10 and 25) mmol/L, respectively to cell A and cell B. Results were compared with classical methods UV-Spectrophotometric at λ max = 289 nm and turbidimetric method by using standard addition method via t-test at 95% level confidence. The comparison of data explains that long-distance chasing photometer (NAG-ADF-300-2) is the choice with extended stellar detection and broad application.
This study was carried out to evaluate parasitological and immunological of the effect of chitosan and chitosannanoparticles loaded with spiramycin on toxoplasmosis infected mice. After injection intra peritoneal with 103viable tachyzoites for acute infection, treatments given for seven days. Peritoneal fluid examination revealed a significant decrease in the number of Toxoplasmagondiitachyzoites in all treated infected mice compared with infected non-treated. The combined therapy gave better results than single. The best effect was observed in group of mice treated with spiramycin combined with chitosan nanoparticles. Also immunoglobulin Ig Manti body and gamma Interferon (INFγ), Tumor Necrosis Factor alpha (TNF-α) cytokines responses ag
... Show MoreBackground: The Infraorbital foramen is an anatomical structure with an important location in the maxilla, position of foramen in maxillofacial area is necessary in clinical situation requiring regional nerve blocks that are performed in children undergoing facial surgeries to avoid injury to corresponding nerve. The aim of study was to determine the position of the Infraorbital foramen and to correlate Infraorbital foramen position with age and gender using computed tomography. Subjects, Materials, and Methods: The sample consist of prospective study for 50 Iraqi subjects (21 male and 29 female) with age ranged from (5-17) years. The examination was performed on Multi – Slice Spiral Tomography scanner in Al-Karakh General Hospital. Using
... Show MoreIn this study, derivatives of polyvinyl alcohol (PVA) grafted with phthalic anhydride (PhA) and dyes were prepared to produce polymeric materials of PVA-g-PhA, PVA-g-PhA-anthocyanin, PVA-g-PhA-bromophenol blue, and PVA-g-PhAthymol blue. The materials were characterised by FTIR and 1 H NMR spectroscopies. The crystallinity of the polymers was evaluated with powder X-ray difraction, and the thermal stability by thermogravimetric analysis (TGA). The synthetic procedure for the polymeric materials entailed the formation of esters. The FTIR spectra of the polymers confrmed their formation since the ester carbonyl group stretch was observed at approximately 1691–1716 cm−1 in each material. NMR spectroscopy confrmed the addition of t
... Show MoreLandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.
Let be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Topic management is the awareness of how speakers deal with initiating, developing, changing, and ending a topic and how they fix the relationship when a misunderstanding occurs. It is such an important unit of conversation as it includes the transition from one strategy to the other to be accomplished in a systematic and orderly manner. These strategies are impaired in dementia patients thus lead to communication breakdown. This study aims at detecting the dementia patients' topic management strategies in selected speeches and answering the questions of which of these strategies are fully or partially detected in these speeches. The researchers use a qualitative method to examine the speeches of those patients and they adopt an eclectic
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t