New membrane electrodes for determination of ciprofloxacin hydrochloride were prepared depending on ciprofloxacin hydrochloride - phosphotungstic acid (CFH-PT) as an active material and these electrodes were made with three plasticizers: Di-octylphenylphosphonate(DOPH), Di-butyl phosphate (DBP)Tri-n-butyl phosphate(TBP), in PVC matrix. One of the ciprofloxacin electrodes was gave Nernstian slope equal to 57.21 mV/ decade for DOPH membrane with concentration range from 1.5×10-5 to1.0×10-1 M, and detection limit equal to 1.5×10-6 M .Lifetime was 93 days. Non- Nernstian responses equal to 39.40 and 30.70 mV/ decade for membranes DBP, TBP, respectively. These electrodes were gave concentration range from 1.0× 10-5 to 1.0×10-2 and from 4.0×10-5 to 1.0×10-2 M,respectively. Detection limits were 7.0×10-6, and 1.7×10-6M, respectively. Lifetimes were 5,2 days, respectively. Also selectivity, influence of PH and samples analysis of ciprofloxacin in a pharmaceutical preparations were studied.
Aqueous root extract has been used to examine the green production of silver nanoparticles (AgNPs) by reducing the Ag+ ions in a silver nitrate solution. UV-Vis spectroscopy, X-ray diffraction, field emission scanning electron microscopy, and Fourier transform infrared spectroscopy (FTIR) were used to analyze the produced AgNPs. The AgNPs that were created had a maximum absorbance at 416 nm, were spherical in form, polydispersed in nature, and were 685 nm in size.The AgNPs demonstrated antibacterial efficacy against Escherichia coli and Staphylococcus. The dengue vector Aedes aegypti's second instar larvae were very susceptible to the AgNPs' powerful larvicidal action.
The present study was conducted to determine the optimum conditions required for lipase enzyme activity extracted from germinated sunflower seeds, including temperature, pH, agitation, time of incubation, enzyme concentration, substrate type, and concentrations of mineral salts and EDTA. Optimum pH, temperature and time of incubation required for lipase stability were also determined. The results showede optimum lipase activity (3.251U/ml) wasund at 30 ÌŠC and pH 7 after 20 minutes of incubation when using 1 ml lipase enzyme with 0.02 ml of CaCl2 (10 mM) at 100 rpm of agitation and in the presence of olive oil as the substrate for enzyme reaction. EDTA appeared to have inhibitory effects, while Ca+2 and Mg+2 have stimulatory effec
... Show MoreThe compound 2,2'-(((1H-benzo(d)imidazol-2-yl)methyl)azanediyl)bis(ethan-1-ol) was reacted with benzyl bromide to afford compound (1) which used as row material to prepare a series of compounds through condensation reaction, the starting compound were reacted with tosyl chloride to protect the OH group to afford compound 2, then reacted benzyl bromide to produce compound (2), then the compound (2) treated with three compounds ( 2-mercaptobenzthiazole, 2-mercaptobenimidazol and 2-chloromethyl benzimidazole) to form compounds 3a,b, 4a,b and 5a,b respectively. In the another step the click reaction of compound 2,2'-(((1H-benzo(d)imidazol-2-yl)methyl)azanediyl)bis(ethan-1-ol) with Propargyl bromide produce compound 6 which reacted
... Show MoreA simple, rapid and sensitive spectrophotometric method has been proposed for the determination of La (III) using 3-hydroxy -4-(2-hydroxy-phenyl azo) naphthalene -1- sulfonic acid as a chromogenic reagent. This method is based on the formation of a red-pink colored complex, upon the reaction of La(III) with the reagent in an alkaline medium (pH= 9.50), having a maximum absorbance at 459 nm. Beer's law is valid in the concentration range 0.512 µg.ml-1 with a Sandell's sensitivity value of 0.0188 µg.cm-2 and molar absorptivity of 7376.12 L.mol-1.cm-1. The stoichiometric composition of the chelate is 1:3. The effect of the presence of different cations as interferants in the determination of La(III) under the given optimum conditions wer
... Show MoreNew series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.
Objective(s): To determine the impact of the Electronic Health Information Systems upon medical, medical backing and administrative business fields in Al-Kindy Teaching Hospital and to identify the relationship between such impact and their demographic characteristics of years of employment, place of work, and education. Methodology: A descriptive analytical design is employed through the period of April 25th 2016 to May 28th 2016. A purposive "non- probability" sample of (50) subject is selected. The sample is comprised of (25) medical and medical backing staff and (25) administrative staff who are all
Summary
The subject ( meaning of added verbs) is one of the main subjects
which study in morphology since in Arabic language. It is include the meaning
of each format, and the increased meaning occurred by this increment in the
verbs.
The (strain) is one of very important meaning in this subject, it takes a
wide area of morphology studies, and interesting of scientists and
researchists.
There are two famous formats for this meaning; (infa la انفع
ل ), and (ifta
la افتع
ل ). Also There are another formats for the same meaning, but less than
the first two in use, they are; (taf ala تفعّ
ل ), (tafa ala تفاع
ل ), (taf lala ) ,(تفعل
ل
ifanlala افعنلل ), (ifanla .(
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the