Furosemide drug determination in pharmaceutical and biological urine samples using a novel continuous flow-injection analysis technique that is simple, rapid, sensitive and economical. The complex formed by the reaction of furosemide and O-phenylenediamine with oxidative agent K3[Fe(CN)6] to produce an orange-yellow colored product at 460 nm was the basis for the proposed method. The proposed method’s linearity ranges (3-100) μg.mL-1and (1-50) μg.mL-1 for CFIA/merging zone methods and batch .The detection limit and Limit of quantification values were 2.7502 μg.mL-1 and 9.1697 μg.mL-1 the relative standard deviation was 0.7143 %, and the average recovery is 98.80% with a verified sample throughput of 73 h-1 . The new approach was effectively employed to determination of furosemide the presence of in the pure, biological, and pharmaceutical samples.
هدفت الدراسة الى التعرف على مستوى استخدام إدارة المعرفة و تكنولوجيا المعلومات لدى القيادات الإدارية تُعدّ لعبة الإسكواش من الألعاب الفردية، وواحدة من ألعاب المضرب، والتي تمتاز بالسرعة والحركة الدائمة في داخل القاعة، ولعل أهم ما يميز هذه اللعبة المتعة التي يشعر بها اللاعبون الممارسون لها، لأنها تجبر ممارسيها على الحركة المستمرة عن طريق تبادل لعب الكرة، وتتميز بالتحدي المباشر، وتتطلب اليقظة والحرص وال
... Show MoreIn this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.
In this article four samples of HgBa2Ca2Cu2.4Ag0.6O8+δ were prepared and irradiated with different doses of gamma radiation 6, 8 and 10 Mrad. The effects of gamma irradiation on structure of HgBa2Ca2Cu2.4Ag0.6O8+δ samples were characterized using X-ray diffraction. It was concluded that there effect on structure by gamma irradiation. Scherrer, crystallization, and Williamson equations were applied based on the X-ray diffraction diagram and for all gamma doses, to calculate crystal size, strain, and degree of crystallinity. I
... Show MoreSpeech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Abstract—Over the two past decades, the rapid integration of capital markets underlined the necessity for developing a single set of high quality international accounting standards. The growing acceptance of international accounting standards has given power for International Accounting Standards Board (IASB) to work and develop this project. Iraq is a country where its accounting practices have been influenced by different philosophies from outside and inside Iraq during its modern history. After the fall of Saddam Hussain international institutions have begun to play an important role in reshaping Iraq’s economy including its accounting for oil. This paper investigates the challenges and opportunities for Iraq in transitioning from it
... Show MoreThe state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of
... Show MoreIn this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.
The goal of this research is to solve several one-dimensional partial differential equations in linear and nonlinear forms using a powerful approximate analytical approach. Many of these equations are difficult to find the exact solutions due to their governing equations. Therefore, examining and analyzing efficient approximate analytical approaches to treat these problems are required. In this work, the homotopy analysis method (HAM) is proposed. We use convergence control parameters to optimize the approximate solution. This method relay on choosing with complete freedom an auxiliary function linear operator and initial guess to generate the series solution. Moreover, the method gives a convenient way to guarantee the converge
... Show MoreMany fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.
This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro
... Show More