A sensitivity-turbidimetric method at (0-180o) was used for detn. of mebeverine in drugs by two solar cell and six source with C.F.I.A.. The method was based on the formation of ion pair for the pinkish banana color precipitate by the reaction of Mebeverine hydrochloride with Phosphotungstic acid. Turbidity was measured via the reflection of incident light that collides on the surface particles of precipitated at 0-180o. All variables were optimized. The linearity ranged of Mebeverine hydrochloride was 0.05-12.5mmol.L-1, the L.D. (S/N= 3)(3SB) was 521.92 ng/sample depending on dilution for the minimum concentration , with correlation coefficient r = 0.9966while was R.S.D% < 1% of 2,6 mmol.L-1 conc. of Mebeverine hydrochloride. The method is used successfully for three different of target drugs in three different pharmaceutical formulations. A comparison using t-test was studied. It was shown that there is no significant difference between two values.
A hierarchically porous structured zeolite composite was synthesized from NaX zeolite supported on carbonaceous porous material produced by thermal treatment for plum stones which is an agro-waste. This kind of inorganic-organic composite has an improved performance because bulky molecules can easily access the micropores due to the short diffusion path to the active sites which means a higher diffusion rate. The composite was prepared using a green synthesis method, including an eco-friendly polymer to attach NaX zeolite on the carbon surface by phase inversion. The synthesized composite was characterized using X-ray diffraction spectrometry, Fourier transforms infrared spectroscopy, field emission scanning electron microscopy, energy d
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreA new tridentate ligand has been synthesized derived from phenyl(pyridin-3-yl)methanone. Three coordinated metal complexes were prepared by complexation of the new ligand with Cu(II), Ni(II) and Zn(II) metal salts. The new Schiff base “benzyl -2-[phenyl(pyridin-3-yl)methylidene]hydrazinecarbodithioate” and the new metal complexes were characterized using various physico-chemical and spectroscopic techniques. From the analysis results, the expected structure to the metal complexes are octahedral in geometry for Cu(II) complex, square planner for Ni(II) and tetrahedral for Zn(II) complex. The new compounds are expected to show strong bioactivity against bacteria and cancer cells.
This study was carried out to obtain the optimum conditions necessary for the process of soya protein hydrolysis by using hydrochloric acid (as a chemical catalyst) instead of the papain enzyme (as a biological catalyst), for the production of soya peptone. These conditions are implemented to test the effect of the variables of the process of hydrolysis on the nature and quality of the product.
The production of soya peptone was studied for their importance in the process of preparing and producing the culture media used in medical and microbiological laboratories.
The process of production of soya peptone includes four main
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThis study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators
A faunistic review of the genus Chaitophorus Koch, 1854, including four species in Iraq is given; the distribution data of each species and their hosts have been recorded. In this investigation the poplar leaf aphid Ch. populialbae (Boyer de Fonscolombe, 1841) is recorded here for the first time in Iraq on popular trees Populus euphratica Oliv. during the period from November 2016 to April 2017 in Baghdad province.
A brief description for apterous viviparous female of this species is given; and a key to the species of the genus Chaitophorus is constricted.
