Preferred Language
Articles
/
jUJVAJoBMeyNPGM39rth
A simple stability-indicating HPLC method for simultaneous analysis of paracetamol and caffeine and its application to determinations in fixed-dose combination tablet dosage form
...Show More Authors

A simple, economic, rapid, reliable, and stability-indicating high-performance liquid chromatography (HPLC) method has been developed and validated for the simultaneous determination of paracetamol (PCM) and caffeine (CF) in solid dosage form. The chromatographic separations were achieved with a Waters Symmetry® C18 column (5 μm, 4.6 × 150 mm), using a mixture of methanol and water (40:60, v/v) as a mobile phase, under isocratic elution mode with a flow rate of 0.8 mL/min, and ultraviolet (UV) detection was set at 264 nm. The oven temperature for the column was set and maintained at 35 °C. The method was validated according to International Conference on Harmonization (ICH) guidelines, and it demonstrated excellent linearity, with a correlation coefficient of 1 and 0.9999 for PCM and CF, respectively, over the concentration ranges of 15–300 μg/mL (PCM) and 2.5–50 μg/mL (CF). The retention time (tR) was found to be 2.6 ± 0.001 and 3.5 ± 0.002 min for PCM and CF, respectively. Extensive stress degradation studies were conducted by subjecting the analytes to various stress conditions of acidic and alkaline hydrolysis as well as oxidative, photolytic, and heat degradations. The method was found to efficiently separate the analytes' peaks from that of the degradation products, without any variation in their retention times. The relative standard deviation (RSD) values of all recoveries for PCM and CF were less than 1.3%. The method was found to be suitable for routine analysis of PCM and CF in pharmaceutical dosage form.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Measuring The Efficiency of The Departments of The College of Administration and Economics / University of Baghdad Using the Method of Data Envelopment Analysis (DEA), A Comparative Study
...Show More Authors

The research aims at the possibility of measuring the technical and scale efficiency (SE) of the departments of the College of Administration and Economics at the University of Baghdad for a period lasting 8 years, from the academic year 2013-2014 to 2018-2019 using the method of Applied Data Analysis with an input and output orientation to maintain the distinguished competitive position and try to identify weaknesses in performance and address them. Nevertheless, the research problem lies in diagnosing the most acceptable specializations in the labor market and determining the reasons for students’ reluctance to enter some departments. Furthermore, the (Win4DEAp) program was used to measure technical and scale efficiency (SE) and rely on

... Show More
Scopus
Publication Date
Fri Nov 05 2021
Journal Name
Review Of International Geographical Education Online
Measuring The Efficiency of The Departments of The College of Administration and Economics / University of Baghdad Using the Method of Data Envelopment Analysis (DEA), A Comparative Study
...Show More Authors

Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
Teaching methods approved in the university and its relationship to classroom discipline and management proposals treated
...Show More Authors

The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.

     Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Negotiation Behavior and Its Relationship to Some Variables of Administrative Teachers
...Show More Authors

Abstract

The current research aims to identify the negotiation behavior of administrative teachers, as well as to identify the significance of the differences in negotiation behavior according to the variables (gender, scientific title, length of service). After confirming the psychometric characteristics of (20) items, the researchers applied the scale to (400) male and female administrative teaching staff who were randomly selected from the University of Baghdad for the academic year 2021/2022. The results showed the following the research sample has a negotiating behavior. There are no statistically significant differences between gender, scientific title, and length of service in the means of negotiating beha

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Gender Identity Disorder and Its Relationship to Family Upbringing of Adolescents
...Show More Authors

Abstract

The current research aims to identify the role of family upbringing methods in shaping adolescent gender identity disorder, to identify the causes, components, and disorders of the gender identity of adolescents, and to develop practical visions and suggestions to reduce and stop gender identity disorder completely. Due to the sensitivity of the topic, a questionnaire of five open-ended questions was posted on Facebook to collect the needed data, where (20) respondents answered these questions. The researcher took these (20) respondents as the study sample. The results revealed that excessive emancipation within the family, failure to employ family protection laws, and failure to monitor and follow up on

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
Journal Of Educational And Psychological Researches
Self-control of kindergarten teachers and its relationship to some variables
...Show More Authors

The aim of the current research is to identify the self-control of kindergarten teachers as well as to identify the significance of the differences according to a variable (years of service, academic achievement, specialization). Its final paragraphs consist of (35) paragraphs, and its psychometric properties were verified and the tool was applied to a sample of (400) teachers chosen randomly from kindergarten teachers affiliated to the General Directorates of Education in Baghdad, Rusafa, and Karkh for the academic year 2019-2020

In light of the objectives of the current research, the following results were reached

  1. The current research sample is from kindergarten teachers with self-contro
  2. There are diffe

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Dogmatism and Its Relation to Behavioral Problems of Preparatory School Students
...Show More Authors

 The study aims to identify the relationship between Dogmatism and the behavioral problems among preparatory school students. To do this, the researcher adopted Rokeach’s scale of dogmatism, which was modified to be more appropriate of the Iraqi context. A sample of (300) students was chosen randomly to collect the needed data for the current study. To process the data, the researcher employed T-test, Pearson correlation coefficient, and Weighted Mean. The finding revealed that the study sample experience too many behavioral problems, as well as there is a positive strong relationship between Dogmatism and behavioral problems. To conclude, the researcher recommended holding counseling sessions targeting school students to mitigate

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
Family Dialogue of Kindergarten’s Parents and its Relation to Children’s Fears
...Show More Authors

The research aims at Identifying family dialogue of kindergarten’s parents. 2)  Exploring the fears that kindergarteners suffer from. 3) Identifying family dialogue of kindergarteners’ parents and the fears of their children. To achieve the aim of the research, the researcher designed two scales: one for the family dialogue of kindergarteners’ parents, and the other for the fears of the kindergarten’s child. To identify the relationship between these two elements, the scale subjected to the consultation of a group of specialized expertise in educational and psychological sciences to certify the propriety of the items. The reliability of the scale of the family dialogue recorded (0.85). As for the scale of children’

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More