Chromatographic and spectrophotometric methods for the estimation of mebendazole in
pharmaceutical products were developed. The flow injection method was based on the oxidation of
mebendazole by a known excess of sodium hypochlorite at pH=9.5. The excess sodium hypochlorite is then
reacted with chloranilic acid (CAA) to bleach out its color. The absorbance of the excess CAA was recorded
at 530 nm. The method is fast, simple, selective, and sensitive. The chromatographic method was carried out
on a Varian C18 column. The mobile phase was a mixture of acetonitrile (ACN), methanol (MeOH), water
and triethylamine (TEA), (56% ACN, 20% MeOH, 23.5% H2O, 0.5% TEA, v/v), adjusted to pH = 3.0 with
1.0 M hydrochloric acid. Naphazoline nitrate was used as an internal standard. The absorption of mebendazole
was measured using a variable wavelength UV detector at 290 nm. Linearity was obtained in the concentration
range of 1-60 and 0.10-3.0 mg/L for the HPLC and FIA, respectively. The methods were applied successfully
for the assay of mebendazole in pharmaceutical products and no interferences were observed from the common
excipients usually used. The proposed methods were validated for their accuracy and precision.
Numerous blood biomarkers are altered in COVID-19 patients; however, no early biochemical markers are currently being used in clinical practice to predict COVID-19 severity. COVID-19, the most recent pandemic, is caused by the SRS-CoV-2 coronavirus. The study was aimed to identify patient groups with a high and low risk of developing COVID-19 using a cluster analysis of several biomarkers. 137 women with confirmed SARS CoV-2 RNA testing were collected and analyzed for biochemical profiles. Two-dimensional automated hierarchy clustering of all biomarkers was applied, and patients were sorted into classes. Biochemistry marker variations (Ferritin, lactate dehydrogenase LDH, D-dimer, and C- reactive protein CRP) have split COVID-19 patien
... Show MoreIn the present work, leaching process studiedusing organic acids (acetic acid and lactic acid) to extract phosphate from the Iraqi Akashat phosphate ore by separation of calcareous materials (mainly calcite). This approach characterized by energy conservation, environmental enhancement by recovery of calcite as calcium sulfate (gypsum), keeping the physical and chemical properties of apatite. Samples were analyzed using X-ray diffraction and FTIR spectrophotometer. From the obtained experimental data it was found that using the two organic acids yields closed purity values of the produced apatite at the optimum conditions, while at different acid concentrations, it was found that the efficiency of acetic acid is higher at the low acid co
... Show MoreBaghdad and the other Iraqis provinces have witnessed many of celebrations which have the significant effect on the souls of Arabic and Islamic people in general , and Iraqi people, especially the birthday and death of two al-kadhimen Imams(peace upon them) and others .From here the researcher begin to study the visiting of imam kadhimen (peace upon him) on 25 Rajab the commemoration of his sacrifice, simply because have implications of religious, ideological and cultural sectors which represents in finding the greatest flow of visitors .the problem of research appeared due to the clear difference in number of visitors during one day, beside the significant increase in number of visitors throu
... Show MoreIn this research , we study the inverse Gompertz distribution (IG) and estimate the survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes
Supernova explosions are described as very violent events which transfer a significant amount of energy to interstellar media and are responsible for a large variety of physical processes. This study does not discuss the actual explosion mechanisms but follows the behavior of the dynamical evolution of some selected type I and type II supernova remnant and particularly after a thousand years from their explosion and shows how the density of the medium affects the evolution and the lifetime of each remnant. By studying such behaviors, a simplified model has been proposed here for the velocity and radius of the remnant after thousand years of explosion that depends only on the density of the medium and age of the remnant. It has been found th
... Show MoreCanonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.
In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe
... Show MoreChange detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac
CuO nanoparticles were synthesized in two different ways, firstly by precipitation method using copper acetate monohydrate Cu(CO2CH13)2·H2O, glacial acetic acid (CH3COOH) and sodium hydroxide(NaOH), and secondly by sol-gel method using copper chloride(CuCl2), sodium hydroxide (NaOH) and ethanol (C2H6O). Results of scanning electron microscopy (SEM) showed that different CuO nanostructures (spherical and Reef) can be formed using precipitation and sol- gel process, respectively, at which the particle size was found to be less than 2 µm. X-ray diffraction (XRD)manifested that the pure synthesized powder has no inclusions that may exist during preparations. XRD result
... Show MoreThis paper discusses estimating the two scale parameters of Exponential-Rayleigh distribution for singly type one censored data which is one of the most important Rights censored data, using the maximum likelihood estimation method (MLEM) which is one of the most popular and widely used classic methods, based on an iterative procedure such as the Newton-Raphson to find estimated values for these two scale parameters by using real data for COVID-19 was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. The duration of the study was in the interval 4/5/2020 until 31/8/2020 equivalent to 120 days, where the number of patients who entered the (study) hospital with sample size is (n=785). The number o
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More