Preferred Language
Articles
/
bsj-2606
Spectrophotometric method for the determination of Captopril in pharmaceutical formulations
...Show More Authors

A simple, rapid and sensitive spectrophotometric method has been developed for the determination of captopril in aqueous solution. The method is based on reaction of captopril with 2,3-dichloro 1,4- naphthoquinon(Dichlone) in neutral medium to form a stable yellow colored product which shows maximum absorption at 347 nm with molar absorptivity of 5.6 ×103 L.mole-1. cm-1. The proposed method is applied successfully for determination of captopril in commercial pharmaceutical tablets.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
Modeling strategy in the subject of recitation provisions for students of Islamic sciences colleges
...Show More Authors

on the subject of the provisions of recitation among students of the Islamic Sciences Colleges).

The researchers adopted the experimental method and chose an experimental design for the two equivalent groups by post-test. The research sample consisted of (60) male and female students from (second stage) - Department of Qur’an Sciences and Islamic Education - University of Diyala, and the two researchers were rewarded between the two groups of research in the following variables: (Chronological age calculated in months, degrees of recitation rulings subject in the previous year, the two researchers studied the same research groups, and lasted for an entire semester, the researchers prepared the observation card to measure the ru

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 27 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of electronic applications in the preparation of operational budgets: An applied research in one of the private sector companies for dairy industry / Baghdad
...Show More Authors

A revolution called information revolution has recently invaded the world. It is Currently considered one of the most important properties of development to the countries of the world The criteria provided by computers such as accuracy, speed, time saving Storage and restore have led them to be widely used in economy, industry, agriculture, communications, etc., as well as being the major finder of reengineering the operations of innovation. The use of computers in the preparation of budgets will lead to achieve accuracy. Since, the operation draws upon the statistic and quantity estimations about budget items, the computerized balance sheet may save time and effort of preparing mathematical equations annually. According to the problem o

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role innovative leadership in administrative empowerment (Study analysis of the views of a sample of decision makers in the General Company for Food Industries(
...Show More Authors

 Abstract

The objective of the research is to identify the role of innovative leadership in achieving the dimensions of administrative empowerment in the company for the public of food industries. The various variables have shown the importance of innovative leadership to achieve the dimensions of administrative empowerment in both international and local companies. Administrative Empowerment "In order to answer this question, a virtual model was developed to reflect the relationship and impact between innovative leadership and administrative empowerment. The research was based on the analytical descriptive approach.  the research community, The company represented the general company for food industries, retrie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Chromium (VI) Removal from Wastewater by Electrocoagulation Process Using Taguchi Method: Batch Experiments
...Show More Authors

Electrocoagulation is an electrochemical method for treatment of different types of wastewater  whereby sacrificial anodes corrode to release active coagulant (usually aluminium or iron cations) into solution, while simultaneous evolution of hydrogen at the cathode allows for pollutant removal by flotation or settling. The Taguchi method was applied as an experimental design and to determine the best conditions for chromium (VI) removal from wastewater. Various parameters in a batch stirred tank by iron metal electrodes: pH, initial chromium concentration, current density, distance between electrodes and KCl concentration were investigated, and the results have been analyzed using signal-to-noise (S/N) ratio. It was found that the r

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Carbon Nanotubes: Synthesis via Flame Fragment Deposition (FFD) Method from Liquefied Petroleum Gas
...Show More Authors

The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF