A new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreThe execution phase of the project is most dangerous and the most drain on the resources during project life cycle, therefore, its need to monitor and control by specialists to exceeded obstructions and achieve the project goals. The study aims to detect the actual reasons behind mismanagement of the execution phase. The study begins with theoretical part, where it deals with the concepts of project, project selection, project management, and project processes. Field part consists of three techniques: 1- brainstorming, 2- open interviews with experts and 3- designed questionnaire (with 49 reason. These reasons result from brainstorming and interviewing with experts.), in order to find the real reasons behind misman
... Show MoreAbstract:
The aim of the research is to highlight the role of electronic human resources management practices in the sustainability of knowledge capital as one of its success factors, as well as the diagnosis and interpretation of the relationship between research variables and their dimensions. The research problem is that the University of Babil implements some electronic human resources management practices not in a complete way, The level of its application and the problems it faces, as well as the extent to which these practices reflect the knowledge capital and sustainability in the university, and highlights the importance of research as it is concerned with the electronic aspects and achieve the competitive advant
... Show MoreAbstract:
The main objective of the research is to build an optimal investment portfolio of stocks’ listed at the Iraqi Stock Exchange after employing the multi-objective genetic algorithm within the period of time between 1/1/2006 and 1/6/2018 in the light of closing prices (43) companies after the completion of their data and met the conditions of the inspection, as the literature review has supported the diagnosis of the knowledge gap and the identification of deficiencies in the level of experimentation was the current direction of research was to reflect the aspects of the unseen and untreated by other researchers in particular, the missing data and non-reversed pieces the reality of trading at the level of compani
... Show MoreIn today’s competitive environment, organizational efficiency and sustained growth are crucial for survival. The performance of an organization is intricately connected to strategic planning, prompting firms to gather and leverage competitive information for a competitive advantage. Senior managers, recognizing this, initiate actions accordingly. This study aims to investigate the relationship between foresight, vision, strategic partnerships, motivation, system thinking, and organizational performance. Data, gathered through a self-administered questionnaire from various textile units, were analysed using structural equation modelling (SEM). The findings indicate that sub-constructs of strategic intelligence positively impact organizatio
... Show MoreAbstract
This research aims to assess and measure the quality of health services provided by the Baghdad Educational Hospital using five dimensions of 5Qs , Developer model by (Zinelidin), 2006), the problem of the research is to try to determine the quality of health services provided at the hospital as well as the investigation of the existence of the elements of quality contribute to achieve the requirements of customers and their needs, and used for the purposes of this research two approaches, first used Applied Research to 5Qs dimension model and use the Checklist as a Key tool to collection and analysis of data and the second descriptive analytical me
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreProductivity estimating of ready mixed concrete batch plant is an essential tool for the successful completion of the construction process. It is defined as the output of the system per unit of time. Usually, the actual productivity values of construction equipment in the site are not consistent with the nominal ones. Therefore, it is necessary to make a comprehensive evaluation of the nominal productivity of equipment concerning the effected factors and then re-evaluate them according to the actual values.
In this paper, the forecasting system was employed is an Artificial Intelligence technique (AI). It is represented by Artificial Neural Network (ANN) to establish the predicted model to estimate wet ready mixe
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More