Preferred Language
Articles
/
bsj-1392
Batch and Flow-Injection Spectrophotometric Determination of Procaine HCl in Pharmaceutical Preparations Via Using Diazotization and Coupling Reaction
...Show More Authors

Simple and sensitive batch and Flow-injection spectrophotometric methods for the determination of Procaine HCl in pure form and in injections were proposed. These methods were based on a diazotization reaction of procaine HCl with sodium nitrite and hydrochloric acid to form diazonium salt, which is coupled with chromatropic acid in alkaline medium to form an intense pink water-soluble dye that is stable and has a maximum absorption at 508 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 1-40 and 5-400 µg.ml-1 of Procaine HCl, with detection limits of 0.874 and 3.75 µg.ml-1 of Procaine HCl for batch and FIA methods respectively. The FIA average sample throughput was 70 h-1. All different chemical and physical experimental parameters that affecting on the development and stability of the colored product were carefully studied and the proposed methods were applied satisfactorily for the determination of Procaine HCl in an injections samples using the standard addition method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of New Mesomorphic Azo Compounds and Study their Photoluminesecence Properties
...Show More Authors

The preparation of a new Azo compounds of highly conjugated dimeric and polymeric liquid crystal to achieve the crystalline characteristics Which have structures assigned based on elemental analysis, IR 1HNMR and CHNS-O while mesogenic properties have been set for DSC and hot-stage polarizing optical microscopy. The compounds show enantiotropicnematic phase being displayed. The compounds show photoluminescence properties in the organic solution at room temperature, with the fluorescence band centered around 400 nm.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Marketing mix and its role in promoting the status of insurance companies in the customers mind: Exploratory comparative research between the Iraq public insurance company and the private insurance company
...Show More Authors

The ability of insurance companies to achieve goals depends on their ability to meet customers' requirements, and this requires them to identify target markets and respond to needs and wishes of the markets, the skill is to convince the company to operate what is in the interest of the customer if he is convinced the customer service provided to him, he would repeat to deal with, and where the cost of maintaining existing customers is less than the cost of attracting new customers, the insurance companies that is working hard to maintain their customers, the more customer satisfaction with the services provided has increased loyalty and weakened the ability of competitors lured.

       &nbs

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Al-kindy College Medical Journal
Comparison between the Use of bupivacaine 0.5%alone and bupivacaine 0.5% with nefopam 20mg in sciatic n block ( popliteal approach) and femoral n block in patients undergoing below knee surgery
...Show More Authors

Objective : Sciatic nerve block (popliteal approach) and femoral N block is a new technique other than general anesthesia in below knee surgery because it provides adequate muscle relaxation, with good intraoperative and post-operative analgesia. Nefopam is non opioid, non-respiratory depressant and non-sedative was mixed with local anesthetics drug to study the effects. This study was done to compare the onset and duration of sensory and onset time and duration of action of motor block following administration of either bupivacaine alone with administration of bupivacaine and Nefopam in patients undergoing below knee lower limb surgeries under ultrasound guided regional anesthesia.
Methods: 100 patients with American society of anest

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the forensic accounting philosophy in the transparency and quality of financial statements: : An applied study on a sample of workers at the Trade bank of Iraq and the Gulf Commercial Bank in Babylon
...Show More Authors

This research aims to identify the role that forensic accounting plays on the transparency and quality of the financial statements in trade bank of Iraq and the Gulf Commercial Bank in Babylon. This research came to address the problem that most financial institutions suffer from, which is represented by the lack of transparency and the quality of the financial statements issued in a manner. Annual also the manipulation and fraud in the financial data, which causes a big gap between that institutions and organizational stakeholders. According to the implementation of the research hypothesis and the objectives of the research, a questionnaire was prepared consisting of three axes, the first axis dealing with the demographic distri

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 14 2020
Journal Name
Modern Sport
The Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for men
...Show More Authors

The aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi

... Show More
Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Using Neural Network with Speaker Applications
...Show More Authors

In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref