Liquid membrane electrodes for the determination iron(III) were constructed based on chloramphenicol sodium succinate and iron(III) CPSS-Fe(III) as ion pair complex, with four plasticizers Di-butyl phosphate (DBP); Di-butyl phthalate (DBPH); Di-octyl phthalate (DOP); Tri-butyl phosphate (TBP); in PVC matrix . These electrodes give Nernstian and sub-Nernstian slopes (19.79, 24.60, 16.01 and 13.82mV/decade) and linear ranges from (1x10-5-1x10-2 M, 1x10-5-1x10-2 M, 1x10-6-1x10-2 M and 1x10-5-1x10-2 M) respectively. The best electrode was based on DBP plasticizer which gave a slope 19.79 mV/decade, correlation coefficient 0.9999, detection limit of 9×10-6 M, lifetime 37 day displayed good stability and reproducibility and used to determine iron(III) in pharmaceutical samples. The selectivity coefficient interferences of (K+, Na+, Cu+2, Mn+2, Zn2+, Al3+,Folic acid) were studied using separate and mixed methods for selectivity coefficient determination. The pH and life time of the electrodes were also studied.
The current study is considered a field study to measure the level of satisfaction of the academic programs of Media Masters students. That was accomplished through surveying the attitudes of the students who are enrolled in the faculties of media at the following universities: (Petra University, The Middle East University (MEU), and Al-Yarmouk University). Those students were enrolled in the master’s program within the formal educational system during the second semester of the academic year (2015 – 2016). This survey aims to identify the services, facilities and academic programs provided by the concerned faculties. It, also, aims to identify the public relations, administrative, educational and services aspects of those faculties.
... Show MoreThat internal control is particularly important in improvingperformance and tax reform، they play an important role in the regularity ofwork and development and the anti corruption and activating the decisionsand tax legislation، as contained in the organizational plan and the means،procedures and components designed from which to ensure a policy andimplementation plans The research aims to review the reality of the internalcontrol in the General Commission for Taxes and stand on the deficiencies init, with the strengthening of the role of internal control in the GeneralAuthority for taxes based on the laws and regulations and by using modernmeans to work as well as developing the performance of employees in thebody، including helpin
... Show MorePurpose: This research is to identify the most important challenges for the local investment commissions and to develop solutions and proposals to encourage local and foreign investment in local governments in Iraq (the Iraqi provinces are irregular in the region). Theoretical Framework: This research suggests a conceptual framework for the local investment commissions in order to solve their problems, the most important of which was to identify the most critical challenges which are facing the Baghdad Investment Commission BIC and how to overcome them. Design/The methodology approach: Research involved a mixed-methods approach through two stages. During the first stage, the researcher gathered quantitative data from all inves
... Show MoreReflect the sustainable development of the interaction of three key elements are the economic component and the social component and the environmental component while focusing economic component to achieve economic growth and focuses social element to achieve social justice in the distribution of income and achieve prosperity, the environmental component related fields and including emphasizes the protection of the environment and to ensure the continuation and sustainability of resources physical, biological and form in which it believes the interaction required for development process real and effective and sustainable, and is considered the province of Kurdistan Iraq of important areas where the movement of developmental mount
... Show MoreTo perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More