Preferred Language
Articles
/
QhbrpogBVTCNdQwCP3qg
Cloud point extraction method for the sensitive determination of metoclopramide hydrochloride in pharmaceutical dosage forms
...Show More Authors

In this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of methods were carefully studied. Using optimal conditions, the linearity of calibration curves was in the range of 0.4-13 and 0.05-4µg/mL and limits of detection of 0.044 and 0.028 µg/mL of MTH for batch and CPE methods respectively. Average recoveries for samples were detected to be between 97-101 %for both methods, with the relative standard deviation (RSD %) best than 2.7 % and 4.5 % for both methods, respectively. The suggested methods were applied successfully for assay of MTH in commercial pharmaceutical tablets.

Scopus Crossref
View Publication
Publication Date
Thu Dec 20 2018
Journal Name
Al-adab Journal
An Evaluation of the "English for Iraq" Course for the Fifth Grade Secondary Schools
...Show More Authors

Providing Iraqi students with proficiency in English is the ultimate goal of the educational system which is a way of getting knowledge in the fields of arts, sciences, transferring knowledge and sciences to other communities. Therefore, conducting such a type of study is very important because the contents of English textbooks have a huge influence on learning of the students. Once the content of English textbooks contain errors as the correct one, this will effect on his/her learning. The present study is an attempt to evaluate the new course entitled “English for Iraq” for fifth grade students for secondary schools, by Olivia Johnston and Mark Farell. It aims to answer eleven questions relating to the following domains: strength, obj

... Show More
View Publication
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Towards a proposed conception of the role of the professional practice specialist for social work In the field of social care for corona patients (A field study at the Iraqi Ministry of Social Affairs)
...Show More Authors

This study aimed to identidy the role of a professional social worker practice specialist in the field of social care for Corona patients, in light of some demographic variables such as (gender, marital status, economic status,), through a field study at the Iraqi Ministry of Social Affairs. A random sample of (50) social workers in the Iraqi Ministry of Social Affairs in various places affiliated with the ministry was chosen. a questionnaire developed by the researcher about the role of the social worker in the field of social care for Corona patients was administered to the study sample to collect the needed data. The results showed that there is a positive statistically significant correlation relationship at the level (0.01) between

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 26 2021
Journal Name
Modern Sport
The effect of special exercises in developing the strength endurance of the arms of the national team players with the goal ball for the blind
...Show More Authors

The importance of the research lies in preparing an experimental curriculum according to a scientific method that will contribute to the development of the special strength(endurance the strength of arms) in order to contribute to the attempt to develop the basic skills of the national team players ‏with the goal ball for the blind ‏As for the research problem, it lies in the weakness of the strength endurance of the national team players with the goal ball for the blind, as the research problem is clearly evident in the last minutes of the match, as well as the former studies in the field of goal ball game for the blind at the country level ‏The research aims to prepare special exercises for endurance of strength as well as t

... Show More
View Publication
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Chromium (VI) Removal from Wastewater by Electrocoagulation Process Using Taguchi Method: Batch Experiments
...Show More Authors

Electrocoagulation is an electrochemical method for treatment of different types of wastewater  whereby sacrificial anodes corrode to release active coagulant (usually aluminium or iron cations) into solution, while simultaneous evolution of hydrogen at the cathode allows for pollutant removal by flotation or settling. The Taguchi method was applied as an experimental design and to determine the best conditions for chromium (VI) removal from wastewater. Various parameters in a batch stirred tank by iron metal electrodes: pH, initial chromium concentration, current density, distance between electrodes and KCl concentration were investigated, and the results have been analyzed using signal-to-noise (S/N) ratio. It was found that the r

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Carbon Nanotubes: Synthesis via Flame Fragment Deposition (FFD) Method from Liquefied Petroleum Gas
...Show More Authors

The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Degree possession of secondary teachers for effective teaching skills from the perspective of the teachers themselves in the Mafraq Governorate
...Show More Authors

This study aimed to reveal the degree possession of secondary teachers for effective teaching skills from the perspective of the teachers themselves in the Mafraq governorate .To achieve the objective of the study(45) teachers were chosen randomly, also a questionnaire composed of 17 was prepared spread over three skill areas (planning, implementation, evaluation).
After application of the tool on the sample results of the study showed that the degree of ownership ranged between medium and high.
The results showed no differences in the degree of ownership due to the variables of sex in favor of females and variable qualification for the benefit of people with qualified Master higher, while differences are attributed to the experien

... Show More
View Publication Preview PDF