A reliable differential pulse polarographic (DPP) method has been developed and applied for the determination of ibuprofen IBU in dosage form with dropping mercury electrode (DME) versus Ag/AgCl. The best peak was found at cathodic peak of -1.18 V in phosphate buffer at pH=4 and 0.025M of KNO3 as supporting electrolyte. In order to obtaine the highest sensitivity, instrumental and experimental parameters were examined including the type and concentration of supporting electrolyte, pH of buffer solution, pulse amplitude and voltage step time. Diffusion current showed a direct linear relationship to ibuprofen concentration in the range of (5 – 30) μg. mL-1 (2.43× 10-5 – 1.45 × 10-4 mol·L–1) with correlation coefficient r= 0.9999, detection limit (S/N = 3) =3.40 μg. mL-1 (1.65 × 10-5 mol·L–1) and the value of precision in terms of relative standard deviation RSD%, ranged between 0.374-0.5176 %. The established DPP method offers an excellent analytical figure of merits as well as its successful applicability to examine two commercial drug forms (tablet and suspension) for the determination of ibuprofen.
Many studies and researchers have reported significant evidence that some physical properties of water can be changed as it passes through a magnetic field that can improve water use. This can have a promising potential for applications, especially in the fields of irrigation and drainage. In this research, magnetized water was used to leach salt-affected sandy loam soil. A test rig was designed and constructed to investigate the effects of magnetized water on leaching soil. The rig consists of a magnetization device that can provide variable intensity. Water was supplied from a constant head reservoir to the magnetization device then to the soils that were placed in plastic columns. Five different magnetic intensi
... Show MoreBackground: One of the most common problems that encountered is postburn contracture which has both functional and aesthetic impact on the patients. Various surgical methods had being proposed to treat such problem. Aim: To evaluate the effectiveness of square flap in management of postburn contracture in several part of the body. Patients and methods: From April 2019 to June 2020 a total number of 20 patients who had postburn contracture in various parts of their body were subjected to scar contracture release using square flap. The follow up period was ranging between 6 months to 12 months. Results: All of our patients had achieved complete release of their band with maximum postoperative motion together with accepted aesthetic outcome. A
... Show MoreTo assess the contribution of Doppler broadening and examine the
Compton profile, the Compton energy absorption cross sections are
measured and calculated using formulas based on a relativistic
impulse approximation. The Compton energy-absorption cross
sections are evaluated for different elements (Fe, Zn, Ag, Au and Hg)
and for a photon energy range (1 - 100 keV). With using these crosssections,
the Compton component of the mass–energy absorption
coefficient was derived, where the electron momentum prior to the
scattering event caused a Doppler broadening of the Compton line.
Also, the momentum resolution function was evaluated in terms of
incident and scattered photon energy and scattering angle. The res
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreThis paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreOne of the most important problems in concrete production in Iraq and other country is the high sulfate content in sand that led to damage of concrete and hence reduces its compressive strength and may leads to cracking due to internal sulfate attack and delay ettringite formation. The magnetic water treatment process is adopted in this study. Many samples with different SO3 content are treated with magnetic water (12, 8, 4 and 2)L that needed for each 1kg of sand with the magnetic intensity (9000 and 5000) Gaus. The magnetic water needed is reduced with less SO3 content in sand. The ACI 211.1-91 concrete mix design was used in this research with slump range (75- 100) mm and the specified compressive strength (35MPa). The compressive streng
... Show MoreCorrosion behavior of aluminum alloy 7025 was investigated in hydrochloric acid (pH=1) containing 0.6 mol.dm-3 NaCl in the existence and absence of diverse concentrations of sulphamethoxazole as environmentally friendly corrosion inhibitor over the temperature range (298-313)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency has been raised with increased sulphamethoxazole concentration but lessened at temperature increases. The highest efficiency value was 96.5 at 298 K and 2 x10-4 mol.dm-3 concentration of sulphamethoxazole. The sulphamethoxazole adsorption was agreed with Langmuir adsorption isotherm. Some thermodynamic parameter (△Gads) and activation energy (Ea) were determin
... Show MoreIn the absence of environmental regulation, food stays to be contaminated with heavy metals, which is becoming a big worry for human health. The present research focusses on the environmental and health effects of irrigating a number of crops grown in the soils surrounding the Al-Rustamia old plant using treated wastewater generated by the plant. The physicochemical properties, alkalinity, and electrical conductivity of the samples were evaluated, and vegetable samples were tested for Cd, Pb, Ni, and Zn, levels, and even the transfer factor (TF) from soils to crops and crop and multi-targeted risk, daily intake (DIM) of metals, and health risk index (HRI) was calculated. The findings found that the average contents of Zn, Pb, Ni, and Cd in
... Show MoreStream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha
... Show More