This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreThe experiment was conducted in the fields belonging to the Department of Horticulture, College of Agricultural Engineering Sciences, University of Baghdad, at Al-Jadriya Complex / Station A, for the autumn season of 2022-2023. The aim was to study the effect of water fish irrigation and water lens plant extract foliar application on the growth and productivity of beetroot. The experiment included two factors: the first factor was water fish irrigation with five concentrations (A) Control treatment (irrigation with river water and recommended fertilization), (B) Water fish irrigation at 25% concentration, (C) water Fish irrigation at 50% concentration, (D) Water Fish irrigation at 75%
This study examines the impact of adopting International Financial Reporting Standards (IFRS) on the value of economic units. Given the global push toward standardization of financial reporting to enhance financial statement transparency, comparability, and reliability, this research seeks to understand the implications of these standards for economic valuation within a region characterized by its unique economic and regulatory challenges. A questionnaire was distributed to 86 Iraqi academics specializing in economics, accounting, and finance to collect their views on the impact of adopting international financial reporting standards. Through careful statistical analysis, the study concluded that applying international financial reporting s
... Show MoreThe consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen
... Show MoreIn current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organi
... Show MoreThis work was influenced the separation and preconcentration steps were carried out to determination of metformin (MET) in pharmaceutical preparations and human serum samples. Complex formation method and cloud-point extraction (CPE) coupling with UV-Visible spectrophotometry were used to investigated of study target.The results has showed the best optical characteristic for calibration curve and statistical data which were obtained under optimum conditions. The first method is based on the reaction of MET with nickel (II) in alkaline medium an absorption maximum ?)max) at 434nm. ''Beer's low'' is obeyed in the concentration range (10-100µg.ml-1) with molar absorptivity of 3.9x103 L.mol-1.cm-1.The limit of detection and quantitation valu
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show Moreيعد العلاج الحركي من الوسائل العلاجية التأهيلية من الوسائل المهمة الامنة لأنها تؤمن على حياة الانسان بكافة شؤونه وتعد التمرينات التأهيلية اسلوبا فعالاً وطبيعياً لا تعرض المريض الى مضاعفات على وظائف الجسم الاخرى لأنها خالية من اي دواء كيمياوي ضار ، كما استخدمت تقنيات حديثة في العلاج الطبيعي بشكل واسع معد حسب اسس علمية منها تمرينات (Core) التي تساعد في تخفيف الالام بالانزلاق الغضروفي للفقرة الرابعة والخا
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More