A simple, accurate and sensitive spectrophotometric method for the determinaion of epinephrine is described . The method is based on the coordination of Pr (III) with epinephrine at pH 6. Absorbance of the resulting orange yellow complex is measured at 482 nm . A graph of absorbance versus concentrations shows that beer 's low is obeyed over the concentration range (1-50)mg.ml-1 of epinephrine with molar absorpitivity of ( 2.180x103 L.mol-1.cm-1 ), a sandell sensitivity of (0.084 mg.cm-2 ), a relative error of (-2.83%) , a corrolation coffecient (r= 0.9989) and recovery % ( 97.03 ± 0.75 ) depending on the concentration.This method is applied to analyse EP in several commercially available pharmaceutical preparations using direct methods .All statistical calculations are implemented via a Minitab software version 11.
In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreThis study aimed to obtain a local isolation of Aspergillus niger and then studied its ability to produce citric acid from raw materials available locally using solid state fermentation. Six local isolates were collected from different sources including some samples of the damaged fruits such as grapefruit, oranges and sindi. Wheat bran was used as a raw material or as culture medium for the production of citric acid from the collected isolates. The conditions for citric acid production were determined by humidity percentage of 1: 1 (water: culture medium), temperature of 28 C, pH 4 and inoculum dose with 5× 106 spore/ml and for 3 days of incubation. The orange was the best model for citric acid production with a concentration of 12.8 mg/m
... Show MoreThe invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of
... Show Moreconventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreA joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get
... Show More