Vitamins play an important role in the human health, and thus they are the kind of major nutrients in the body. Chemical products perform numerous physiological functions and can jeopardize health jointly in their absence and surplus. Therefore, it is necessary to establish methods for observation vitamin levels in various molds. In this review paper, the most methods of determination used are high performance liquid chromatography (HPLC), spectrophotometric and potentiometric techniques by listed the value of : slope, linear range, correlation coefficient, detection limit, the max of wavelength and PH and compared with these methods.
A mercury porosimeter has been used to measure the intrusion volume of the three types mercury positive lead acid-battery plates. The intrusion volumes were used to calculate the pore diameter, pore volume, pore area, and pore size distribution. The variation of the pore area in positive lead acid-battery plates as well as of the pore volume has the following sequence. Paste positive > Uncured positive > Cured positive
Amino acids are the basic building block for peptides and proteins. They are raw materials for generating hormones, purines, pyrimidines and vitamins. Amino acids also provide the body with energy through their carbon structures. The study analyzed the amino acid in the kidneys of the albino mice embryo at 17 and 19 gestation days, using a high-performance liquid chromatography device (HPLC). Samples were obtained after removing them from the embryo and placing them in an ice bath to prevent cell lysis and acid loss. The study found 18 amino acids in the kidneys of the albino mice embryo. They are Asparagine (Asn), Glutamine (Glu), Serine (Ser), Glycine (Gly), Threonine (Thr), Histidine (His), Cysteine (Cys), Alanine (Ala), Proline
... Show MoreA mercury porosimeter has been used to measure the intrusion volume of the three types mercury positive lead acid-battery plates. The intrusion volumes were used to calculate the pore diameter, pore volume, pore area, and pore size distribution. The variation of the pore area in positive lead acid-battery plates as well as of the pore volume has the following sequence. Paste positive > Uncured positive > Cured positive
Abstract
This study aims to identify the level of emotional intelligence among principals of basic education schools in Al-Dakhiliya Governorate. The descriptive approach was used. A questionnaire of two parts was utilized; its second part included (27) items divided into five dimensions related to emotional intelligence. The study sample consisted of (337) teachers representing 52% of the study sample were randomly selected. The study result showed that level of the emotional intelligence is high and the motivation dimension is the highest. There were no statistical differences at the level (α≤ 0.05) due to the impact of (the social type, the educational qualification, and the years of experience) in all the
... Show MoreAbstract
Dame Ngaio Edith Marsh (1899-1982), a writer of detective fiction, was born
at Christchurch, New Zealand. Her hero, Chief Detective Inspector Roderick Alleyn,
appears in her first novel, A Man Lay Dead (1934), and in subsequent novels
including Death and the Dancing Footman (1942). She wrote twenty detective novels.
The Dancing Footman, Thomas, listening to a playful song from the smokingroom's
radio where William lay dead after being killed by his brother, Nicholas,
provides the most suspected guest at Highfold with badly needed alibi. The murderer,
Nicholas, plans an almost perfect crime, but the dance of this footman spoils his
scheme. When Alleyn and his group of policemen stage a show in which the
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More