Continuous turbidimetric analysis (CTA) for a distinctive analytical application by employing a homemade analyser (NAG Dual & Solo 0-180°) which contained two consecutive detection zones (measuring cells 1 & 2) is described. The analyser works based on light-emitting diodes as a light source and a set of solar cells as a light detector for turbidity measurements without needing further fibres or lenses. Formation of a turbid precipitated product with yellow colour due to the reaction between the warfarin and the precipitation reagent (Potassium dichromate) is what the developed method is based on. The CTA method was applied to determine the warfarin in pure form and pharmaceutical formulations in the concentration range from 2.0-16& 0.7-16 mmol/L with 0.58 and 0.55 mmol/L of the limit of detections. The correlation coefficients (r) of the developed method were 0.9977 and 0.9981 for cell 1 and 2 respectively. For validation of proposed method, the ICH guidelines were followed. The developed method was successfully applied for the determination of Warfarin in pure and pharmaceutical preparations. In addition, the method can be considered as a quality control method and conveniently used for routine analysis in laboratories since the method permits quantitatively determination of 60 samples/h.
An essential tool for studying the web is its ability to show how energy moves through an ecosystem. Understanding and elucidating the relationship between species variety and their placement within the inclusive trophic dynamics is also beneficial. A food web ecological model with prey and two rival predators under fear and wind flow conditions is developed in this article. The boundedness and positivity of the system’s solution are established mathematically. The stability and existence constraints of the system’s equilibria are examined. The proposed system’s persistence limitations are established. Additionally, the bifurcation analysis of every potential equilibrium is examined using the Sotomayor theorem. To describe the
... Show MoreThis research aims to knowledge the extent of the application of Tuz General Hospital to the concept of tacit knowledge dimensions (mental models, intuition, experience, skill) and methods of acquiring knowledge dimensions (training, job rotation, work teams) and the measurement and analysis of the link and the kind of impact between the methods of acquiring knowledge and tacit knowledge of the Angels nursing in the researched hospital, and was the questionnaire primary means of collecting information adopted by the researcher that, the research sample of (90) individuals, including the Angels nursing, has been using the statistical program spss for the purpose of conducting statistical treatments, and through the diagnosis and m
... Show MoreIn this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.
This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreIt reflects the gross domestic product in any country total output of goods and services by the size of the country's citizens and foreign residents during the period of the year and reflect the contribution of the commodity sectors of the economy and the distribution and service in the composition of output. And gross domestic product in Iraq as an indicator dominated in the composition of oil output, along with the contribution of the service sector, as the gross domestic product is the output of a yield lien and subjected GDP in Iraq to a series of declines succession due to vibrations of the oil market during the economic blockade on the one hand and stop imported production inputs, lack of arriving in commodity s
... Show MoreThis paper examines the decolonizing methods used by Leslie Marmon Silko in her novel Ceremony (1977) to heal the indigenous people from the patriarchal traditions of the white hegemony. This study aims to emphasize the vulnerable responses of the Pueblo people to the memories of the clan and to highlight Silko’s methods to sustain the history and lifestyle of the indigenous people. Therefore, Silko’s novel can be situated historically and culturally within memory-studies. To analyze the contrasting behaviors of characters, this paper projects the relationship between the collective patriarchal doctrines and that of the individual within the framework of memory studies. Theories of Jan and Aleida Assmann are used here to explore the
... Show MoreSystems on Chips (SoCs) architecture complexity is result of integrating a large numbers of cores in a single chip. The approaches should address the systems particular challenges such as reliability, performance, and power constraints. Monitoring became a necessary part for testing, debugging and performance evaluations of SoCs at run time, as On-chip monitoring is employed to provide environmental information, such as temperature, voltage, and error data. Real-time system validation is done by exploiting the monitoring to determine the proper operation of a system within the designed parameters. The paper explains the common monitoring operations in SoCs, showing the functionality of thermal, voltage and soft error monitors. The different
... Show More