A method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results have shown that the preconcentration factor of 71 fold leading to obtain a limit of detection of 2.67 ng mL-1 with linear calibration range of 5-150 ng mL-1 (r=0.9998) and a superb sensitivity in terms of molar absorptivity of 1.13x106 L.mol-1.cm-1 . The mean percent recovery of 99.78±0.53% and the precision (RSD %) ranged from 1.96 to 0.76 are achieved. The developed method is applied to the determination of iron in four selected pharmaceutical drugs. The experimental values agree statistically with the quoted values stated by the manufacturer’ companies.
The study aimed to identify the effect of the ethical perception of a sample of managers in public organizations on responsible behavior in light of the rapid changes taking place in the external environment. To achieve this, the researcher followed the descriptive analytical approach by applying a questionnaire of two parts. The first part dealt with the ethical perception according to the scale of Johnson (2015), which consisted of (22) items. The second part dealt with measuring responsible behavior, which consisted of (20) items based on the scale of Development of Ethical Behavior (Narvaez, 2006) for a sample of (125) respondents randomly chosen. The results showed that the estimation degree of managers in public governmental o
... Show MoreAutorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
The topic of the research dealt with the image of Iraq in the British press based on a sample of the newspapers (The Guardian and the Daily Telegraph), which are among the most important and largest newspapers in the United Kingdom and the world, because of its active role in guiding local and international public opinion towards important issues and events, Since these two newspapers are interested in the accuracy of sensitive political topics, the message aimed at knowing the media image that these two newspapers painted about Iraq in the period that was limited to the first quarter of 2019, and also to know the nature of the contents promoted by these newspapers about the Iraqi reality, The method of content analysis was used as an ap
... Show MoreIn this work, the spirurid nematode Hartertia gallinarum was reported in the intestine of the spotted sandgrouse, Pterocles senegallus, collected in three different locations: Ga'ara Depression, Iraqi Western Desert, Zurbatiyah and Al-Attariyah, Middle of Iraq. Description and measurements of the nematode were given. The role of termites in the infection of P. senegallus with H. gallinarum was discussed. Occurrence of H. gallinarum in P. senegallus represents a new host record.
Modern trends have appeared recently in educational thought that call for the achievement of the outcomes of the educational process. Some of these trends are the development of individual thinking skills, considering the individual differences, and learning basic skills. The five-year learning cycle is one of these models. It is called as five-year learning cycle because it passes through five stages. These five stages are: (operate - discover - clarify - expand – Evaluate), which make the learner as the main axis for activating thinking processes. This can be done by organizing study materials through research, investigation, and identifying concepts by himself, as in learning sports skills that depend on motor performance and teamwork,
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe research explain the analysis of finance investments through analyze the finance tables for commercial banks, by using the pointers to indicate the limits of economical benefit for these investments, and fix the negative deviations and as well positive, for the purpose of diagnostic the negative (disadvantage) and develop the advantage deviation, For the importance of finance investments in the development operation and economical growth, further to that the finance investments is represent one of the most activities in the commercial banks in which aim the adequate incomes as a result of the commercial banks act to receipt the banks deposits and then make it growth and develop through commercial advantage o
... Show More