Pesticides serve a crucial function in contemporary farming practices, safeguarding agricultural crops against pest infestations and boosting production outputs. However, indiscriminate use has caused environmental and human health damage. This study aimed to develop and validate a gas chromatography-flame ionization detection (GC-FID) methodology for the direct and routine analysis of spiromesifen residues in soil, leaves, and tomato fruits. The proposed method prioritizes simplicity by avoiding derivatization steps, offering advantages over existing approaches that utilize lengthy multi-step extraction or derivatization prior to GC analysis. A key novelty of this work is the development of a QuEChERS extraction coupled directly to GC-FID without further clean-up or chemical treatment steps, rendering the method more convenient and accessible for routine monitoring applications. Factors evaluated included: sample solvent; inlet and column temperature profiles; inlet type; sample volume; and injection technique. Recovery and matrix effect studies were conducted by fortifying tomato, leaf, and soil matrices at three different concentrations (0.5, 1, and 10 µg ml-1). Quadruplicate analyses (n = 4) yielded mean recoveries of 98.74% (fruits), 93.92% (leaves), and 94.18% (soil), confirming efficient extraction. Matrix effects were negligible at -7.9%, -7.8%, and -5.3%, respectively. The chromatographic linearity of the developed GC-FID method was excellent over the 0.002–20 µg ml-1 range with R2 > 0.9979. The method demonstrated good precision, with inter- and intra-day RSD% ranging from 0.06–1.8%, below the 3% limit. GC-MS analysis confirmed spiromesifen identification. Under greenhouse conditions, residual levels were 1.39 mg/kg in soil, 8.24 mg/kg in tomato, and 3.39 mg/kg in leaves. Dissipation followed first-order kinetics with a half-life of 1.6 days. The optimized GC-FID method is promising for monitoring spiromesifen usage and guiding agricultural practices. © (2024), (Iranian Chemical Society). All rights reserved.
Abstract
The aim of this paper is to model and optimize the fatigue life and hardness of medium carbon steel CK35 subjected to dynamic buckling. Different ranges of shot peening time (STP) and critical points of slenderness ratio which is between the long and intermediate columns, as input factors, were used to obtain their influences on the fatigue life and hardness, as main responses. Experimental measurements of shot peening time and buckling were taken and analyzed using (DESIGN EXPERT 8) experimental design software which was used for modeling and optimization purposes. Mathematical models of responses were obtained and analyzed by ANOVA variance to verify the adequacy of the models. The resul
... Show MoreThere are many problems facing the economic entities as a result of its mass production &variation of its products , the matter which had increased the need & importance of cost accounting which is regarded a main tool for the managerial control.
The actual costing system is unable to meet the contemporary management needs ,so the Standard costing system appear to provide the management with required information to perform its functions by the best use& way.
This research aims to determine the standard cost for the direct material for oil extraction activity by applying it in the north oil company.
This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreA study were conducted to examinate the effect of organic and aqueous (Hot, Cold) Extracts from leaves of Duranta repens on the growth and activities of the following types of Bacteria:- Staphylococcus aureus,Streptococcus pyogens ,Escherichia coli,Klebsilla pneumonia, in addition to the yeast Candida albicans and the fungi Aspergullis niger ,Aspergulls flavus.The result showed that gram Positive Bacteria is more sensitive to the extracts than gram negative bacteria with Minimum inhibitory concentration (MIC) value (50,25,50,100)% and Minimum Bactericidal Concentration (MBC) value (100,50,200,100)% for all types Bacteria respectively . The most active extract against A.niger ,A,flavus was cold and hot aqueous extract from the leaves with d
... Show MoreIn this research, the results of x-ray diffraction method were used to determine the uniform stress deformation and microstructure parameters of CuO nanoparticles to determine the lattice strain obtained and crystallite size and then to compare the results obtained by two model Halder Wagner and Size Strain Plot with the results of these methods of the same powder using equations during which the calculation of the size of the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (19.81nm) and the lattice strain (0.004065) of the Halder-wagner model respectively and for the ssp method were the results of the crystallite size (17.20nm) and lattice strain (0.000305) respectively. The sa
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this study, performance characteristics such as power take off (PTO) power consumption, fuel consumption, fuel consumption for the unit field-unit product were determined at different working speeds with two different PTO applications (540 and 540E) in a single row disc type silage machine. In particular, the 540E PTO application greatly reduces fuel consumption for unit work. The best results in terms of hourly fuel consumption were achieved in 540E PTO application and V1 working speed. When the field - product fuel consumption is evaluated, the best results were obtained with the 540E PTO application at the V3 working speed. When an evaluation is made considering all the parameters, it is concluded that the 540E PTO application will p
... Show More