Preferred Language
Articles
/
ijs-782
Determination of Vitamin B6 (pyridoxine hydrochloride) in Pharmaceutical Preparations Using High Performance Liquid Chromatography
...Show More Authors

Determination of vitamin B6 (pyridoxine hydrochloride) was described using high performance liquid chromatographic method. The analysis was achieved by cosmos IL 5C18-MS-II column (250 mm x 4.6 mm i. d., 5µm particle size) at room temperature. The mobile phase used was Acetonitrile, buffer solution (Citric acid, Na2HPO4 pH4) buffer solution in the ratio (70:30) (V: V). the flow rate was set to 1.25 mL.min-1 and the retention time 1.82 min with UV-detection at 282 nm. Beer's law was obeyed over the concentration range 10-1250 µg.mL-1. The method was accurate (relative error % less than 0.05%), precise (RSD better than ±1.05%), average recovery 100.05%, with a limit of detection and quantification of 2.2μg.ml−1, and 7.34μg.mL−1 respectively. The proposed method was successfully applied to determine the pyridoxine hydrochloride in pharmaceutical preparations in both forms of tablet and injection

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Science
Study of desertification using remote sensing imagery in South Iraq
...Show More Authors

Recently The problem of desertification and vegetation cover degradation become an environmental global challenge. This problem could be summarized as as the land cover changes. In this paper, the area of Al- Muthana in the south of Iraq will be consider as one of Semi-arid lands. For this purpose, the Ladsat-8 images can be used with 15 m in spatial resolution. In order to over Achieve the work, many important ground truth data must be collected such as, rain precipitation, temperature distribution over the seasons, the DEM of the region, and the soil texture characteristics. The extracted data from this project are tables, 2-D figures, and GIS maps represent the distributions of vegetation areas, evaporation / precipitation, river levels

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Corrosion inhibition of zinc in hydrochloric acid solution using Ampicillin
...Show More Authors

The corrosion behavior of Zn in 0.1 M HCl solution containing various concentration of Ampicillin range (2 x 10-4 – 1x10-3) M was investigated. The corrosion rates were measured by using weight loss measurement and polarization curve, The results of polarization method obtained showed that the rate of corrosion of zinc increased with increasing the temperature from 293K to 323K and the values of inhibition efficiency of ampicillin increased with increasing the temperature and AMP concentrations, the results showed that AMP caused to protection efficiency reached to 88.8% when (1x10-3) M AMP concentration was used in 323K. The coverage (θ) of metal surface by AMP could be obtained from the rate of corrosion in the presence and absence

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Evaluate the Rate of Pollution in Soil using Simulink Environment
...Show More Authors

       In this paper we design a Simulink model which can be evaluate the concentration of Copper, Lead, Zinc, Cadmium, Cobalt, Nickel, Crum and Iron. So, this model would be a method to determine the contamination levels of these metals with the potential for this contamination sources with their impact. The aim of using Simulink environment is to solve differential equations individually and as given data in parallel with analytical mathematics trends. In general, mathematical models of the spread heavy metals in soil are modeled and solve to predict the behavior of the system under different conditions.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Production of fibrinolytic protease from various fungal isolates and species 2.Determination of optimum conditions for enzyme production from Pleurotus ostreatus
...Show More Authors

The optimum conditions for production of fibrinolytic protease from an edible mushroom Pleurotus ostreatus grown on the solid medium , Sus medium, composed of Sus wastes (produced from extracted medicinal plant Glycyrrhiza glabra) were determined. Addition of 5% of Soya bean seeds meal in Sus medium recorded a maximum fibrinolytic protease activity resulting in 7.7 units / ml. The optimum moisture content of Sus medium supplemented with 5% Soya bean seeds meal was 60% resulting in 7.2 units / ml.Pleurotus ostreatus produced a maximum fibrinolytic protease activity when the spawn rate,pH of medium and incubation temperature were 2,6 and 30°C, respectively. The maximum fibrinolytic protease activity was 7.6 units / ml when incubat

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Environmental study of groundwater in southwest of Baghdad, Yusufiyah using GIS
...Show More Authors

Ground water hydrochemical study in Yusufiyah depends upon (25) wells where major cations and anions were obtained as well as trace elements. The hydrochemical properties include the study of (pH, EC, TDS, and TH). The groundwater of the study area is odorless and colorless except the wells (13 and 16) with a salty taste due to the elevated (TDS) concentration in it, where the wells depth ranges between 7-20 meters. Depth of water in these wells was about 25-35 meters above sea level. Groundwater generally flows from east to west and from north east to south west. The resource of groundwater depends upon surface water. Physical specifications are measured in the water samples included temperature, color, taste, odor, pH, electrical condu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Potential Using of Mixed Microalgae in the Bioremediation of Domestic Effluents
...Show More Authors

Microalgae widely used for bioremediation of inorganic (NH4and PO4) nutrients as single isolates. This study aims to use a mix microalgae isolated from Dijlah river for bioremediation of municipal waste water .The experiments had been start with two different concentrations of nutrients. NH4-N values were 23.4 and 31.7mg/l, phosphorus PO4-P 6.7and 10.7 mg/ l and BOD5 were 66 and 83 mg/l. both cycles of treatment showed complete removal for NH 4-N and PO4-P levels after treatment were 1.7 and 0.7 mg/l for both of treatment cycle .Biological oxygen demand reduced to lowest value were18.9 in 2nd cycle while in 1st cycle of treatment reduced to21.3mg/l.The results showed that mix microalgae have the ability to remove nutrients and organic po

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 27 2019
Journal Name
Iraqi Journal Of Science
Watermarking in 3D Models Using Depth Path
...Show More Authors

This paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.

View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref