A simple, accurate, and cost-efficient UV-Visible spectrophotometric method has been developed for the determination of naphazoline nitrate (NPZ) in pure and pharmaceutical formulations. The suggested method was based on the nucleophilic substitution reaction of NPZ with 1,2-naphthoquinone-4-sulfonate sodium salt in alkaline medium at 80°C to form an orange/red-colored product of maximum absorption (λmax) at 483 nm. The stoichiometry of the reaction was determined via Job's method and limiting logarithmic method, and the mechanism of the reaction was postulated. Under the optimal conditions of the reaction, Beerʼs law was obeyed within the concentration range 0.5–50 μg/mL, the molar absorptivity value (ε) was 5766.5 L × mol–1 × cm–1, Sandellʼs sensitivity value was 0.0474 μg/cm2, the limits of detection and quantification were found to be 0.2154 and 0.6529 μg/mL, respectively. The formation constant of the complex was calculated by using the Benesi–Hildebrand equation. The suggested method was successfully applied for the quantification of NPZ in pharmaceutical formulations with good accuracy and precision. Therefore, this method can be applied for routine analysis of naphazoline.
Recent reports of new pollution issues brought on by the presence of medications in the aquatic environment have sparked a great deal of interest in studies aiming at analyzing and mitigating the associated environmental risks, as well as the extent of this contamination. The main sources of pharmaceutical contaminants in natural lakes and rivers include clinic sewage, pharmaceutical production wastewater, and sewage from residences that have been contaminated by drug users' excretions. In evaluating the health of rivers, pharmaceutical pollutants have been identified as one of the emerging pollutants. The previous studies showed that the contaminants in pharmaceuticals that are widely used are non-steroidal anti-inflammatory drugs, ant
... Show MoreThe adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol
... Show MoreThe aim of present study is to determine the optimum parameters of friction stir welding process and known the most important parameter along with percentage contribution of each parameter which effect on tensile strength and joint efficiency of FS welded joint of dissimilar aluminum alloys AA2024-T3 and AA7075-T73 of 3 mm thick plates by applied specific number of experiments using Taguchi method .AA2024 was placed on the advancing side and AA7075 on the retreating side. FSW was achieved under three different rotation speeds (898, 1200 and 1710) rpm, three different welding speeds (20, 45 and 69) mm\min , three different pin profiles (cylindrical, threaded cylindrical and cone) and tool tilt angle 2◦. Taguchi method w
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreNew Fourteen compounds were synthesized in four steps. The first step included synthesis of 2-biphenyl fused ring of imidazo(1,2- a)pyrimidine from the reaction of 2-aminopyrimidine and biphenyl phenacyl bromide . The second step was introduced aldehyde group from the reaction of 2-biphenyl fused rings of imidazo(1,2-a)pyrimidine with POCl3 in presence of DMF and CHCl3. 3-Carbaladehyde derivatives of fused imidazo/pyrimidine was reacted with different aromatic amines to afford new Schiff bases. These new 3- imines derivatives was reduced by using sodiumborohydride to yield another new 3-aminomethyl-2-biphenyl imidazo (1,2-a)pyrimidine derivatives in moderate yield .Some new prepared compounds were identified by melting point, FT- IR , 13C-
... Show MoreThe process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel
... Show More