A new, Simple, sensitive and accurate spectrophotometric methods have been developed for the determination of sulfamethoxazole (SMZ) drug in pure and dosage forms. This method based on the reaction of sulfamethoxazole (SMZ) with 1,2-napthoquinone-4-sulphonic acid (NQS) to form Nalkylamono naphthoquinone by replacement of the sulphonate group of the naphthoquinone sulphonic acid by an amino group. The colored chromogen shows absorption maximum at 460 nm. The optimum conditions of condensation reaction forms were investigated by (1) univariable method, by optimizing the effect of experimental variables (different bases, reagent concentration, borax concentration and reaction time), (2) central composite design (CCD) including the effect of three experimental factors (reagent concentration, borax concentration, and reaction time). The linearity ranges of sulfamethoxazole are (5-50) µg.mL-1 at 460 nm with molar absorptivity (6.7878×104- 7.0918×104) L.mol-1.cm-1, Sandell's sensitivity index (0.3755- 0.3571) μg.cm-2 and detection limit of (0.3755– 0.3594) µg.mL-1 for each procedure respectively. The results showed there are no interferences of excipients on the determination of the drug. The proposed method has been successfully applied for the determination of sulfamethoxazole in pure and pharmaceutical preparations.
Objective: To determine the quality assurance for maternal and child health care services in Baghdad City.
Methodology: A descriptive study is conducted throughout the period of November 28th 2008 to October 10th
2009. A simple random sample of (349) is selected through the use of probability sampling approach. The study
sample was divided into four groups which include (220) consumers, (35) medical staff, (72) nursing staff and (22)
organization structure (primary health care centers). Data were collected through the use of assessment tools. It was
comprised of four questionnaires and overall items included in these questionnaires are (116) items. The study
included assessment of organization structure. Data were colle
The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreThe electrical properties of pure NiO and NiO:Au Films which are
deposited on glass substrate with various dopant concentrations
(1wt.%, 2wt%, 3wt.% and 4wt.%) at room temperature 450 Co
annealing temperature will be presented. The results of the hall effect
showed that all the films were p-type. The Hall mobility decreases
while both carrier concentration and conductivity increases with the
increasing of annealing temperatures and doping percentage, Thus,
indicating the behavior of semiconductor, and also the D.C
conductivity from which the activation energy decrease with the
doping concentration increase and transport mechanism of the charge
carriers can be estimated.
The new of compounds synthesized by sequence reactions starting from a reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride to produce the compounds [I]a,b, then the compounds[I]a,b reacted with sodium azide to yield compounds[II]a,b that reacted 1,3-dipolarcycloaddition reaction with acrylic acid to give compounds [III]a,b these compounds reacted with methanol led to ester compounds[IV]a,b then reacted with hydrazine to give acid hydrazide [V]a,b . Finally compounds [V]a,b reacted with aromatic aldehydes to product shiff bases derivatives. The compounds characterized by mp. , IR, 1HNMR in addition to mass spectroscopy for some of them the liquid crystals properties were studied by using polarized optical microsco
... Show More
The varied applications of polystyrene in various fields of life led to examining the cause of radiation influence on some rheological behavior of commercial Polystyrene (PS) solution in the chloroform (CHCl3) solvent. Polystyrene grains shape samples were irradiated using the radioactive element Cesium- 137 with (9 µci) activity for 10, 20, and 30 minutes. The viscosity of the polymer solution depends on the concentration and size (i.e. molecular weight) of the dissolved polymer. Experimental data showed that the radiation dose affected the value of viscosity (shear, relative, specific, and reduced). The viscosity value significantly reduced at 10 min radiation dose and when increasing the dose, the viscosity value increased
... Show MoreResearch aims to identify the immediate impact of the announcement of mergers in the stockholders and the feasibility of gain abnormal return and benefiting from asymmetric information during the announcement that unite 30 days before the announcement of the merger, and announcement day, and 30 days after the announcement of the merger. It was the largest and most important mergers and acquisitions pick that occurred during the global financial crisis, specifically in health care/pharmaceutical industry, Pfizer and Wyeth merger with Novartis acquisition on Alcon. search has adopted three hypotheses: the first hypothesis that ((achieves the target company's shareholders positive abnormal return (or negative) during and befor
... Show MoreThe aim of this research is to investigate the skills of the chemistry students from the Ibn Al-Haytham Education college of pure sciences in Baghdad in understanding and constructing graphical representations of data. The research sample consisted of (101) male and female students in their fourth year of study during the 2016-2017 academic year. This sample represents 71% of the total number of students in this group.The research methodology used consisted of two parts relating to 19 issues. The first part is an objective multi choice type of test to measure the student’s skill in selecting the right representation of specific subject graph amongst many provided. The second part concentrated on measuring the student’s skill in construc
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More