New, simple and sensitive batch and Flow-injecton spectrophotometric methods for the determination of Thymol in pure form and in mouth wash preparations have been proposed in this study. These methods were based on a diazotization and coupling reaction between Thymol and diazotized procaine HCl in alkaline medium to form an intense orange-red water-soluble dye that is stable and has a maximum absorption at 474 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 0.4-4.8 and 4-80 µg.ml-1 of Thymol, with detection limits of 0.072 and 1.807 µg.ml-1 of Thymol for batch and FIA methods respectively. The FIA procedure sample throughput was 80 h-1. All different chemical and physical e
... Show MoreIn this study, a bioadhesive dosage form of eoconazole nitrate for vaginal delivery was designed using a combination of bioadhesive polymers: Carbopol 941 p and sodium carboxymethylcellulose or methylcellulose in different ratios. The bioadhesive strength was evaluated by measuring the force required to detach the tablet from sheep vaginal mucosal membrane. It was found that the bioadhesive force was directly proportional to Carbopol 941 p content in the different formulae. The formulae were tested for their swelling behavior using agar gel plate method. The results showed that formulae containing a combination of Carbopol 941 p and sodium carboxymethylcellulose had greater swelling index
... Show MoreThe fall angle of sun rays on the surface of a photovoltaic PV panel and its temperature is negatively affecting the panel electrical energy produced and efficiency. The fall angle problem was commonly solved by using a dual-axis solar tracker that continually maintains the panel orthogonally positioning to the sun rays all day long. This leads to maximum absorption for solar radiation necessary to produce maximum amount of energy and maintain high level of electrical efficiency. To solve the PV panel temperature problem, a Water-Flow Double Glazing WFDG technique has been introduced as a new cooling tool to reduce the panel temperature. In this paper, an integration design of the water glazing system with a dual-axis tracker has been ac
... Show MoreIn current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organi
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More