A simple analytical method was used in the present work for the simultaneous quantification of Ciprofloxacin and Isoniazid in pharmaceutical preparations. UV-Visible spectrophotometry has been applied to quantify these compounds in pure and mixture solutions using the first-order derivative method. The method depends on the first derivative spectrophotometry using zero-cross, peak to baseline, peak to peak and peak area measurements. Good linearity was shown in the concentration range of 2 to 24 μg∙mL-1 for Ciprofloxacin and 2 to 22 μg∙mL-1 for Isoniazid in the mixture, and the correlation coefficients were 0.9990 and 0.9989 respectively using peak area mode. The limits of detection (LOD) and limits of quantification (LOQ) were measured with first derivative method. The LOD and LOQ were found as 0.45 μg∙mL-1 and 1.50 μg∙mL-1 for Ciprofloxacin and 0.68 μg∙mL-1 and 2.28 μg∙mL-1 for Isoniazid, respectively. Accuracy and precision were determined by measuring the relative standard deviation and recoveries. The results also showed that the proposed method was successfully applied for direct analysis of ciprofloxacin and isoniazid in the tablet samples.
The Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric
The current research is concerned with the prices of Goods and materials in the Iraqi slang a descriptive, lexicographic , and semantic study expressing the meanings of these names and their positions , as well as expressing the imaginations of Human mind , the popular mind in describing these goods with evaluating them besides the semantic of each word accordingly
The current research is divided into two parts , the first part is consisted of Vocalizations" words" That are arisen through cognitive naming that concentrate on the mental imaginations for the most important and sensitive such as colors , taste , shapes and forms impacts of Goods and materials according to users' ' taste for those words , on other hand, the second part of
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe research aims to identify: 1-Designing a test to measure the movement compatibility of the eye and the leg for the students of the Faculty of Physical Education and Sports Sciences, Samarra University. 2-Codification (setting scores and standard levels) for the results of the motor compatibility test for the eye and the leg for students of the Faculty of Physical Education and Sports Sciences, Samarra University. The researchers reached the some following conclusions: 1-A test to measure the movement compatibility of the eye and the leg for the students of the Faculty of Physical Education and Sports Sciences. 2-There is a discrepancy in the standard levels of the research sample.
The objective of this study is to attempt to provide a quantitative analysis to the causes of unemployment in Iraq and its mechanisms of generation, as well as a review of the most important types of both visible and invisible unemployment, and an attempt to measure the disguised unemployment and analyze the causes. The problem of the research lies in the fact that the Iraqi Economy has been suffered for a long time although its characterized by abundant physical and natural resources, from the existence of the phenomenon of unemployment in the previous two types. Causing a lot of economic problems, represented by the great waste of resources and
... Show More