The proposed method is sensitive, simple , fast for the determination of mebeverine hydrochloride in pure form or in pharmaceutical dosage . Using Homemade instrument fluorimeter continuous flow injection analyser with solid state laser (405 nm) as a source. Where it is based upon the fluorescence of fluorescein sodium salt and quenching effect of fluorescence by mebeverine in aqueous medium. The calibration graph was linear in the concentration range 0.05 to10 mMol.L-1 (r= 0.9629) with relative standard deviation (RSD%) for 1 mMol.L-1mebeverine solution was lower than 3% (n=6). Three pharmaceutical drugs were used as an application for the determination of mebeverine. A comparison was made between the newly developed method of analysis wit
... Show MoreThe gas material balance equation (MBE) has been widely used as a practical as well as a simple tool to estimate gas initially in place (GIIP), and the ultimate recovery (UR) factor of a gas reservoir. The classical form of the gas material balance equation is developed by considering the reservoir as a simple tank model, in which the relationship between the pressure/gas compressibility factor (p/z) and cumulative gas production (Gp) is generally appeared to be linear. This linear plot is usually extrapolated to estimate GIIP at zero pressure, and UR factor for a given abandonment pressure. While this assumption is reasonable to some extent for conventional reservoirs, this may incur
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe research aims to identify the most important variables affecting shooting from jumping high and compare them for the two foot the weak and strong, where the researchers adopted the descriptive method, and the sample was chosen by the intentional method, which consists of (4) players from the Iraqi Sports Army Club, where these variables were studied and their impact on The accuracy of aiming at the two men, and the researchers concluded that most of the players have more accuracy in aiming at the strong leg than at the weak leg, which leads to the loss of many real opportunities during the match because of the players changing the situation or wasting the available opportunity when the position of correction is an opportunity for the w
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show More