Purpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identity, crystallinity and purity of NIC. In all media, the measured concentration of NIC was within ± 5 % of the actual value, which confirmed accuracy. The percentage relative standard deviation values were < 1 %, reflecting the precision of the method. The range of concentration measured was between 2 and 24 μg/mL, and all coefficient of determination (R2) values were > 0.99, indicating the linearity of the established analytical method. The limit of detection (LOD) and limit of quantification (LOQ) values were 0.122 and 0.407 μg/mL in ethanol, 0.530 and 1.766 μg/mL in ABS (pH 1.2), 0.224 and 0.747 μg/mL in DW, and 0.798 and 2.662 μg/mL in PBS, pH 7.4. The robustness was confirmed as the measured concentration under slight changes in temperatures and wavelengths were insignificant (p > 0.05). Conclusion: Based on the results above, the UV-visible spectrophotometric method under investigation was validated to be accurate, precise, linear, and robust in all the different media for the determination of NIC.
A new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show More
Abstract
The use of modern scientific methods and techniques, is considered important topics to solve many of the problems which face some sector, including industrial, service and health. The researcher always intends to use modern methods characterized by accuracy, clarity and speed to reach the optimal solution and be easy at the same time in terms of understanding and application.
the research presented this comparison between the two methods of solution for linear fractional programming models which are linear transformation for Charnas & Cooper , and denominator function restriction method through applied on the oil heaters and gas cookers plant , where the show after reac
... Show MoreHuman cerebral cortex is the outer folded neuronal layer and represents major part of the cerebrum with enormous functions. It is a laminar structure, easily visualized grossly. Previous studies showed that the Superior Temporal gyrus is one of the thickest cerebral cortex regions, reaching (about 4 mm). The Electron microscope study was made on 6 samples taken to measure the neuronal soma dimension of the large pyramidal cells present in the internal pyramidal cortical layer V in different age groups and gender. Aging process was obvious on the large pyramidal cells of the cerebral cortex, in which their neuronal soma dimensions showed shrinkage with age progression. But statistically there was no differences in the values between males an
... Show MoreBackground: Debonding orthodontic brackets and removal of residual bonding material from the enamel surface include critical steps that may cause enamel damage. The aim of the present study was to evaluate and compare the site of bond failure and enamel surface damage after debonding of three types of esthetic brackets (composite, ceramic, sapphire) bonded with light cure composite and resin-modified glass ionomer adhesive. Materials and methods: Seventy two maxillary premolars teeth were divided into three groups each group consisted of 24 teeth according to the type of brackets. Each group was subdivided into two subgroups (12 teeth for each) according to the bonding material that was used. After 7 days of bonding procedure, the brackets
... Show MoreMethotrexate (MTX) is widely used chemotherapeutic agent with different side effects including germ cells toxicities. Silibinin is one of the structural isomers of silymarin, with different phytotherapeutic applications, and its possible protective effects against MTX induced germ cells damage were investigated in this work. Twenty five male mice were divided into five groups (n=5) allocated as follows: Group 1 received buffer for five days given by single intraperitoneal (IP) injection per day; Group 2 in addition to buffer for five days, animals received at day five single dose of 20mg/kg of MTX IP. Groups (3, 4, and 5) received respectively, (50, 100, or 150mg/kg body weight) of silibinin IP single daily dose for five days then at day fi
... Show More