Liquid electrodes of domperidone maleate (DOMP) imprinted polymer were synthesis based on precipitation polymerization mechanism. The molecularly imprinted (MIP) and non-imprinted (NIP) polymers were synthesized using DOMP as a template. By methyl methacrylate (MMA) as monomer, N,Nmethylenebisacrylamide (NMAA) and ethylene glycol dimethacrylate (EGDMA) as cross-linkers and benzoyl peroxide (BP) as an initiator. The molecularly imprinted membranes were synthesis using acetophenone (APH), di-butyl sabacate (DBS), Di octylphthalate (DOPH) and triolyl phosphate (TP)as plasticizers in PVC matrix. The slopes and limit of detection of liquid electrodes obtained from the calibration curves ranged from (-18.88– -29.01) mV/decade and (4.0 × 10-5 – 6.0 × 10-5) M, respectively and the response time was about 60 seconds. The Liquid electrodes were filled with (10-2 M) standard solution of the drug and observed stable response for a pH ranged from 2.0 to 11.0 and with good selectivity for over several species. The fresh electrodes of synthesis were effectively used in the pharmaceutical sample to determine DOMP without any time consuming pretreatment measures.
An investigation was conducted to suggest relations for estimating yield and properties of the improved light lubricating oil fraction produced from furfural extraction process by using specified regression.
Mass transfer in mixer-settler has been studied. Mass transfer coefficient of continuous phase, mass transfer coefficient of dispersed phase and the overall mass transfer coefficient extraction of light lubes oil distillate fraction by furfural are calculated in addition to all physical properties of individual components and the extraction mixtures.
The effect of extraction variables were studied such as extraction temperature which ranges from 70 to 110°C and solvent to oil ratio which ranges from 1:1 to 4:1 (wt/wt
... Show MoreA simple, precise, rapid, and accurate reversed – phase high performance liquid chromatographic method has been developed for the determination of guaifenesin in pure from pharmaceutical formulations.andindustrial effluent. Chromatography was carried out on supelco L7 reversed- phase column (25cm × 4.6mm), 5 microns, using a mixture of methanol –acetonitrile-water: (80: 10 :10 v/v/v) as a mobile phase at a flow rate of 1.0 ml.min-1. Detection was performed at 254nm at ambient temperature. The retention time for guaifenesin was found 2.4 minutes. The calibration curve was linear (r= 0.9998) over a concentration range from 0.08 to 0.8mg/ml. Limit of detection (LOD) and limit of quantification ( LOQ) were found 6µg/ml and 18µg/ml res
... Show MoreThe process of discovering pharmaceuticals is of great importance in our contemporary life, in a way that without life becomes almost impossible, as this process is the first building block in the field of pharmaceutical industries to search for new methods and means of treatment and treatment. But in fact, the fact that talking about this process is not that simple and easy, because this process is complicated and difficult in a way that makes it take a time range that in some cases reaches what is permissible ten years to reach a chemical formula that can be used later in the manufacturing process Pharmacokinetics, and during this long period of time, this process will have a set of effects, some of which are specific to the researcher di
... Show MoreAll new compounds synthesized by many reactions starting from a product the compounds [I]a,b from reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride, then the compounds [I]a,b reacted with potassium thiocyanate to yield compounds [II]a,b. While the compounds[III]a,b yield from reacted the compounds [I]a,b with sodium azide then the compounds [III]a,b reacted 1,3-dipolar cycloaddition reaction with acrylic acid to give compounds [IV]a,b and the later compounds reacted with phenylene diamine to product benzimidazole compounds [V]a,b . In addition to synthesized acid chloride compounds [VI]a,b by reacted the compounds [IV]a,b with thionyl chloride .Finally reacted the compounds [VI]a,b with different aromatic amine
... Show More2,2'-(1-(3,4-bis(carboxydichloromethoxy)-5-oxo-2,5-dihydrofuran-2-yl)ethane-1,2-diyl)bis(oxy)bis(2,2-dichloroacetic acid) a derivative of L-ascorbic acid was prepared by reaction of L-ascorbic acid with trichloroacetic acid (1:4) ratio, in the presence of potassium hydroxide. A series of new metal complexes of this ligand were prepared by a reaction with the chlorides of Cd(II), Co(II), Ni(II), Cu(II) and Zn(II). The new ligand and its complexes were identified by C.H.N., IR, UV-visible spectra, Thermogravimetric analysis (TGA), as well as 1H, 13C-NMR and Mass spectra for ligand L. The complexes were also identified by molar conductance, atomic absorption, magnetic susceptibility and X-ray diffraction for Cu (II) complex. FT-IR spectra
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More
