The main objective of this paper is to develop and validate flow injection method, a precise, accurate, simple, economic, low cost and specific turbidimetric method for the quantitative determination of mebeverine hydrochloride (MbH) in pharmaceutical preparations. A homemade NAG Dual & Solo (0-180º) analyser which contains two identical detections units (cell 1 and 2) was applied for turbidity measurements. The developed method was optimized for different chemical and physical parameters such as perception reagent concentrations, aqueous salts solutions, flow rate, the intensity of the sources light, sample volume, mixing coil and purge time. The correlation coefficients (r) of the developed method were 0.9980 and 0.9986 for cell 1 and 2 respectively and showed the linearity of response against concentration over the range of 1.0 to 6.5 and 0.7-6.5mmol/L for cell 1 & 2 respectively. The limit of detections (LOD) for cell 1 and cell 2 were 0.28 and 0.21 mmol/L respectively. The intra-day and inter-day precision for two serial estimations of 3.5 and 5.5 mmol/L of MBH exhibited a relative standard deviation of 0.46%, 0.28%, 0.23%, 0.26% and 0.39%, 0.79%, 0.14%, 0.05% for cell 1 & 2 respectively. The accuracy of the developed method has expressed a recovery percentage (Rec %) and error % which was between 99.22 to 101.13 and 99.39 to 101.17 for cell 1 and cell 2 respectively. The ICH guidelines were followed for method validation. The developed method was successfully applied for the determination of MbH in pure and pharmaceutical preparations and the method can be conveniently used for routine analysis in laboratory as a quality control method since the method permits quantitively determination of 60 samples/h.
A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.
In this paper, the process for finding an approximate solution of nonlinear three-dimensional (3D) Volterra type integral operator equation (N3D-VIOE) in R3 is introduced. The modelling of the majorant function (MF) with the modified Newton method (MNM) is employed to convert N3D-VIOE to the linear 3D Volterra type integral operator equation (L3D-VIOE). The method of trapezoidal rule (TR) and collocation points are utilized to determine the approximate solution of L3D-VIOE by dealing with the linear form of the algebraic system. The existence of the approximate solution and its uniqueness are proved, and illustrative examples are provided to show the accuracy and efficiency of the model.
Mathematical Subject Classificat
... Show MoreIn this work four complexes of antimony were prepared ,Na[SbO(gly)2],Na[SbO(Asp)2],Na[SbO(Tyrosin)2], Na [SbO(phen alanin)2]. by reaction SbOCl with salts amino acids identifiefid these complexes by FTIR ,their conductivity was measured and also their biological activity against two types of bacteria was studied ,they were biologically active.
irrigation use at many stations along the Euphrates River inside the Iraqi lands and to try to correlate the results with the satellite image analyses for the purpose of making a colored model for the Euphrates that can be used to predict the quality classifications of the river for irrigation use at any point along the river. The Bhargava method was used to calculate the water quality index for irrigation use at sixteen stations along the river from its entrance to the Iraqi land at Al-Qaim in Anbar governorate to its union with the Tigris River at Qurna in Basrah governorate. Coordinates of the sixteen stations of the Euphrates River were projected at the mosaic of Iraq satellite image which was taken from LANDSAT satellite for bands 1, 2
... Show MoreA numerical model for Polypropylene 575 polymer melts flow along the solid conveying screw of a single screw extruder under constant heat flux using ANSYS-FLUENT 17.2 software has been conducted. The model uses the thermophysical properties such as Viscosity, thermal conductivity, Specific heat and density of polypropylene 575 that measured as a function of temperature, and residence time data for process simulation. The numerical simulation using CFD models for single screw extruder and the polymer extrusion was analysed for parameters such as (thermal conductivity, specific heat, density and viscosity) reveals a high degree of similarity to experimental data measured. The most important outcome of this study is that geometrical, parame
... Show MoreThis study concerns a new type of heat exchangers, which is that of shell-and-double concentric tube heat exchangers. The case studies include both design calculations and performance calculations.
The new heat exchanger design was conducted according to Kern method. The volumetric flow rates were 3.6 m3/h and 7.63 m3/h for the hot oil and water respectively. The experimental parameters studied were: temperature, flow rate of hot oil, flow rate of cold water and pressure drop.
A comparison was made for the theoretical and experimental results and it was found that the percentage error for the hot oil outlet temperature was (- 1.6%). The percentage
... Show MoreMultiple drilling problems are being faced continuously while drilling wells in the southern Iraqi oil fields. Many of which are handled poorly and inefficiently which yields longer non-productive time due to the lack of knowledge about the source of these problems. This study aims to investigate the Basra oil fields formations from Faris to Mishrif, diagnose the potential problems, and present the optimum treatment for each problem.
Gathering of field data and previous studies on the subject, in addition to the field experience of drilling supervisors were all the information bases of this study. Southern Iraqi oil fields were studied and analyzed care
tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
The rotor dynamics generally deals with vibration of rotating structures. For designing rotors of a high speeds, basically its important to take into account the rotor dynamics characteristics. The modeling features for rotor and bearings support flexibility are described in this paper, by taking these characteristics of rotor dynamics features into standard Finite Element Approach (FEA) model. Transient and harmonic analysis procedures have been found by ANSYS, the idea has been presented to deal with critical speed calculation. This papers shows how elements BEAM188 and COMBI214 are used to represent the shaft and bearings, the dynamic stiffness and damping coefficients of journal bearings as a matrices have been found
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More