A simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected optimum conditions, the linearity ranges of calibration curves were 1-9 and 0.5-8 µg/mL with detection limits of 0.26 and 0.09 µg/mL of ISX for batch and CPE methods respectively. A relative standard deviation (RSD %) best than 1.98 and 2.67 % with the percentage recoveries range 100.14 and 99.63 % were obtained for both methods respectively. The proposed methods were successfully used in routine analysis of ISX in pharmaceutical forms with high accuracy and reproducibility.
يهدف البحث الحالي إلى الاستفادة من القهوة المستهلكة , كمادة وسيطة حيث تعد القهوة المستهلكة من المخلفات المضرة للبيئة الاستخراج الكافيين الطبيعي والذي يعد مادة ذات نشاط حيوي واهمية, وتحديد العوامل الفعالة في كفاءة عملية الاستخلاص من حيث تركيز الكافيين. تضمنت المتغيرات الرئيسية المدروسة وقت الاستخلاص 0-150 دقيقة ، ودرجة الحرارة 25-55 درجة مئوية ، وسرعة الخلط 180-450 دورة في الدقيقة ، ودرجة الحموضة العالق
... Show MoreThe solution gas-oil ratio is an important measurement in reservoir engineering calculations. The correlations are used when experimental PVT data from particular field are missing. Additional advantages of the correlations are saving of cost and time.
This paper proposes a correlation to calculate the solution gas -oil ratio at pressures below bubble point pressure. It was obtained by multiple linear regression analysis of PVT data collected from many Iraqi fields.
In this study, the solution gas-oil ratio was taken as a function of bubble point pressure, stock tank oil gravity, reservoir pressure, reservoir temperature and relative gas density.
The construction of the new correlation is depending on thirty seven PVT reports th
Bacteria could produce bacterial nanocellulose through a procedure steps: polymerization and crystallization, that occur in the cytoplasm of the bacteria, the residues of glucose polymerize to (β-1,4) lineal glucan chains that produced from bacterial cell extracellularly, these lineal glucan are converted to microfbrils, after that these microfbrils collected together to shape very pure three dimensional pored net. It could be obtained a pure cellulose that created by some M.O, from the one of the active producer organism like Acetic acid bacteria (AAB), that it is a gram -ve, motile and live in aerobic condition. The bacterial nanocellulose (BNC) have great consideration in many fields because of its flexible properties, features
... Show MoreThis paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
A study on the treatment and reuse of oily wastewater generated from the process of fuel oil treatment of gas turbine power plant was performed. The feasibility of using hollow fiber ultrafiltration (UF) membrane and reverse osmosis (RO) membrane type polyamide thin-film composite in a pilot plant was investigated. Three different variables: pressure (0.5, 1, 1.5 and 2 bars), oil content (10, 20, 30 and 40 ppm), and temperature (15, 20, 30 and 40 ᵒC) were employed in the UF process while TDS was kept constant at 150 ppm. Four different variables: pressure (5, 6, 7 and 8 bar), oil content (2.5, 5, 7.5 and 10 ppm), total dissolved solids (TDS) (100, 200,300 and 400 ppm), and temperature (15, 20, 30 and 40 ᵒC) were mani
... Show More11-22 Description An apology may be defined as “the act of declaring one’s regret, remorse or sorrow for having insulted, failed, injured, harmed or wronged another (Internet Encyclopedia of Philosophy IEP). A definition quite interested in the function suggests that “an apology is a speech act addressed to B’s face–needs and intended to remedy an offence for which A. takes responsibility.”(Holmes, 1990: 159). Apologies are also" speech acts" that are hard to identify, define or categorize, a difficulty that arises directly out of the functions they perform (Lakoff, 2001: 201) and the forms they take. In function, they range from selfabasement for wrongdoing to the formal display of appropriate feeling. In form, they range from
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More