Preferred Language
Articles
/
philgJYBVTCNdQwChYSF
LC-MS/MS METHOD FOR THE DETERMINATION OF IMATINIB MESYLATE IN BLOOD PLASMA SAMPLES AFTER ADSORPTION BY COPPER TANNIC ACID
...Show More Authors

A novel metal-organic framework (MOF) sorbent based on tannic acid/copper (TA/Cu) was synthesized and characterized for the application of the anticancer drug imatinib (IMA) from biological samples. The TA/Cu MOF was prepared via a facile coordination reaction and thoroughly characterized by SEM, XRD, and FTIR techniques. Critical parameters influencing the extraction efficiency of imatinib mesylate (IMAM), including pH, ionic strength, desorption solvent, and adsorption-desorption time were optimized. With acetonitrile as the desorption solvent, the method demonstrated a broad linear range of 0.55-300 μg L-1 under ideal conditions. Limits of detection and quantification were found to be 0.16 μg L-1 and 0.55 μg L-1, respectively. For plasma samples spiked at clinically relevant concentrations (5, 20, and 50 μg L-1), the sorbent showed good reusability over four cycles and negligible matrix effects. In comparison to previously published methods, the developed dispersive solid phase extraction method based on TA/Cu MOF performed better in terms of simplicity, enrichment factor, and analytical figures. Another objective of this study was to develop a liquid chromatography with tandem mass spectrometry technique that could be commonly and readily used for therapeutic drug monitoring of imatinib following extraction by solid phase extraction (SPE). Therapeutic monitoring applications can reliably quantify IMA in complex biological matrices as a result of the fast dispersive solid phase extraction (DSPE) procedure and environmentally friendly sorbent. For citation: Russol Abdul Salam Faraj, Noor H.K., Saba H. Jamel, Jasim Jamur M.S. LC-MS/MS method for the determination of imatinib mesylate in blood plasma samples after adsorption by copper tannic acid. ChemChemTech [Izv. Vyssh. Uchebn. Zaved. Khim. Khim. Tekhnol.]. 2025. V. 68. N 3. P. 27-35. DOI: 10.6060/ivkkt.20256803.7121.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Mar 13 2019
Journal Name
Al-khwarizmi Engineering Journal
Investigation the Effect of Process Variables on the Formability of Parts Processed by Single Point Incremental Forming
...Show More Authors

Incremental sheet metal forming process is an advanced flexible manufacturing process to produce various 3D products without using dedicated tool as in conventional metal forming. There are a lot of process parameters that have effect on this process, studying the effect of some parameters on the strain distributions of the product over the length of deformation is the aim of this study.

In order to achieve this goal, three factors (tool forming shape, feed rate and incremental step size) are examined depending on three levels on the strain distributions over the wall of the product. Strain measurement was accomplished by using image processing technique using MATALB program. The significance of the control factors are explored u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Effect of Addition of Composite Polyamide Micro Particles and Silicone Dioxide NanoParticle on Some Mechanical Properties of Room Temperature Vulcanized Maxillofacial Silicone Elastomer Before and after Artificial Aging
...Show More Authors

Background: The most common reason for re-making a maxillofacial prosthesis is the degradation of the mechanical properties of the silicone. Aim of this study: To assess some mechanical properties of VST-50F maxillofacial silicone reinforced with a composite of silicon dioxide nanoparticle and polyamide-6 microparticle before and after artificial aging. Material and Method: Preparing 240 samples tested for tear strength, tensile strength and elongation percentage, hardness, and roughness before and after aging. The Silicon dioxide was added in concentrations of 1% by weight and Polyamide-6 in the concentration of 0.25% and 0.5% by weight to the VST-50F RTV maxillofacial silicone. The one-way ANOVA and post hoc tests were used for inferentia

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
ANALYSIS OF THE DISPARITY BETWEEN THE ESTIMATED BUDGET AND THE CURRENT BUDGET IN IRAQ FOR THE PERIOD )2006-2016(
...Show More Authors

The general budget is usually linked to the role of the state in public life and economic activity, whether this role is neutral or interventionist and thus reflects the general objectives that the state seeks to achieve.

for importance of  the public budget in clarifying the image of the political state philosophy and its objectives it seeks to achieve on the one hand and clarifying the degree and rank it occupies in the ladder of development among the other countries. This study is intended to highlight the concepts of the general budget and how its concept has evolved since the Middle Ages. Of the importance of the general budget in Iraq was not based on scientific and objective and then the study

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 09 2022
Journal Name
Scientific Research Journal Of Economics And Business Management
The Effect of Public Spending on the Monetary Sterilization Factor in the Iraqi Economy for the Period 2005-2021
...Show More Authors

Monetary sterilization policies are one of the modern trends of monetary policy in rentier countries, specifically to confront the positive shocks in foreign assets flowing into the national economy and the impact of these shocks on monetary and real variables. And that the Central Bank contains these emergency increases in foreign exchange with the aim of avoiding the impact of this increase on the official local currency through its three main monetary tools, which are the rediscount rate, the legal reserve, and open market operations. As well as the relationship between the central bank and the objective of external balance, which is reflected in the balance of payments balance, the central bank resorts to managing the exchange rate

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Physics
Effects of Hydrogen Peroxide Concentration on Properties of Black Silicon Fabricated by Two-Step Silver-Assisted Wet Chemical Etching for Photovoltaics
...Show More Authors

Crystalline silicon (c-Si) has low optical absorption due to its high surface reflection of incident light. Nanotexturing of c-Si which produces black silicon (b-Si) offers a promising solution. In this work, effect of H2O2 concentrations towards surface morphological and optical properties of b-Si fabricated by two-step silver-assisted wet chemical etching (Ag-based two-step MACE) for potential photovoltaic (PV) applications is presented. The method involves a 30 s deposition of silver nanoparticles (Ag NPs) in an aqueous solution of AgNO3:HF (5:6) and an optimized etching in HF:H2O2:DI H2O solution under 0.62 M, 1.85 M, 2.47 M, and 3.7 M concentrations of H2O<

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Carbon Nanotubes: Synthesis via Flame Fragment Deposition (FFD) Method from Liquefied Petroleum Gas
...Show More Authors

The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref