A simple analytical method was used in the present work for the simultaneous quantification of Ciprofloxacin and Isoniazid in pharmaceutical preparations. UV-Visible spectrophotometry has been applied to quantify these compounds in pure and mixture solutions using the first-order derivative method. The method depends on the first derivative spectrophotometry using zero-cross, peak to baseline, peak to peak and peak area measurements. Good linearity was shown in the concentration range of 2 to 24 µg∙mL-1 for Ciprofloxacin and 2 to 22 µg∙mL-1 for Isoniazid in the mixture, and the correlation coefficients were 0.9990 and 0.9989 respectively using peak area mode. The limits of detection (LOD) and limits of quantification (LOQ) were measured with first derivative method. The LOD and LOQ were found as 0.45 µg∙mL-1 and 1.50 µg∙mL-1 for Ciprofloxacin and 0.68 µg∙mL-1 and 2.28 µg∙mL-1 for Isoniazid, respectively. Accuracy and precision were determined by measuring the relative standard deviation and recoveries. The results also showed that the proposed method was successfully applied for direct analysis of ciprofloxacin and isoniazid in the tablet samples.
The theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreAbstract:
The achievement of agricultural development provide food security and to form a basis for economic growth and comprehensive social, requires a number of actions to overcome the obstacles and problems facing the development of this economic sector, to make it able to achieve food security and operation of the workforce, and reduce dependence on the outside in the provision of food peripherals, and so it is only available through the highest degree of efficiency and economic mobilization of resources, so most of the developed and developing countries alike seek to achieve sustainable agricultural development tobacco meet the food requirements and good jobs for c
... Show MoreThe current research aims to know the method and strategy of rainstorming for students to open the door towards innovation and creativity in the field of teaching the subject of geography and the importance of brainstorming method and the studies that touched on it. The study also dealt with the steps of teaching the method of brainstorming and the most important (traditional and modern), and the difficulties of using the method of brainstorming in the teaching process, as well as explained the guidance to improve teaching using the method of brainstorming in the teaching p
... Show MoreContrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised
... Show MoreThe research aims to shed light on the importance of Natural gas as a National wealth is not being used optimally to be a financial resource is important to Iraq in addition to Oil, as well as could be used as an important Source of Energy, instead of burning gas is a waste of wealth and Contribute to the contamination of the environment. Research Reviews the importance of Natural gas, where is currently about a quarter of global energy consumption. Then deals with the reality of the gas industry in Iraq and winning because of the volume of waste incineration, which reached a rate (45%) of the gas Associated with oil, where Iraq is fourth globally in Terms of the amount of gas Burned. Finally, this paper discusses the future of n
... Show MoreThe work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows: with
... Show MoreBackground/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreCharge multipole Coulomb scattering form factors in 48Ca nucleus have been reproduced utilizing the theory of nuclear shell. The efficient two-body nuclear potential fpbm is considered to construct the-spin orbit term LS vectors with Harmonic Oscillator HO potential as a wave function of single particle in Fp shell. Discarded spaces ( core + higher configuration) are taken into account through the Core polarization effect by model space with accurate two-body potential of Gogny to interact the LS operating particles with the discarded space pair ( particle-hole) with energy of excitation equal to 2ћω. Gogny interaction has been selected as it had succeeded in nuclear shell theory. The computed results were compared with th
... Show More