This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This method has an average recovery percentage by 104%. This result was also supported by the precision, linearity, LOD and LOQ, i.e. 0.0775; 0.968; 0.00000256 and 0.000000775, respectively.
Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show Moreاستخلص عامل التلزن من E. faecalis EM1 بعد تكسير الخلايا بعدة طرق واختيار الطريقة التي تعطي اعلى قيمة تلزن والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه للمستخلص مع انواع من البكتريا السالبة لملون غرام تضمنت Escherichia coli و Klebsiella pneumoniae و Serratia
The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
خلاصة تحاول هدة الدراسة التعرف على أسباب عزوف المرأة عن المشاركة بالعمل السياسى وقد تم اختيار عينة عشوايية من التدريسيات في جامعة بغداد والمستنصرية ودلك للوقوف على هدة الأسباب وبعد تحليل البيانات أشارت نتائح الدراسة الى ان أسباب العزوف عن المشاركة فى العمل السياسى هى أسباب سياسية بالدرجة الأولى تليها الأسباب النفسية والاجتماعية وقد اوصت الدراسة ببعض الم
... Show Moreالمسؤولية المدنية الناشئة عن الاعلان التجاري
يتناول البحث دراسة مسؤولية المستثمر المدنية عن تلوث البيئة من حيث اساسها واركانها واثرها
يتناول البحث دراسة تطبيق نظرية اساءة استعمال الحق في مجال المسؤولية التعاقدية