A simple reverse-phase high performance liquid chromatographic method for the simultaneous analysis (separation and quantification) of furosemide (FURO), carbamazepine (CARB), diazepam (DIAZ) and carvedilol (CARV) has been developed and validated. The method was carried out on a NUCLEODUR® 100-5 C18ec column (250 x 4.6 mm, i. d.5μm), with a mobile phase comprising of acetonitrile: deionized water (50: 50 v/v, pH adjusted to 3.6 ±0.05 with acetic acid) at a flow rate 1.5 mL.min-1 and the quantification was achieved at 226 nm. The retention times of FURO, CARB, DIAZ and CARV were found to be 1.90 min, 2.79 min, 5.39 min and 9.56 min respectively. The method was validated in terms of linearity, accuracy, precision, limit of detection and limit of quantitation. The developed method was successfully applied for the estimation of furosemide, carbamazepine, diazepam and carvedilol in bulk and in pharmaceutical dosage forms.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreLoanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreIn this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
The purified prepared compounds were identified through different methods of identification i.e, I.R, UV-vi^ble-spectroscopy in addition to (coloured tests) Calculation of the sum of OH groups. TLC techniques were also used to test the purity and the speed ofthe rate of flow (RF).
In this study, the stress-strength model R = P(Y < X < Z) is discussed as an important parts of reliability system by assuming that the random variables follow Invers Rayleigh Distribution. Some traditional estimation methods are used to estimate the parameters namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and Shrinkage estimator using three types of shrinkage weight factors. As well as, Monte Carlo simulation are used to compare the estimation methods based on mean squared error criteria.
Abstract
The analysis of Least Squares: LS is often unsuccessful in the case of outliers in the studied phenomena. OLS will lose their properties and then lose the property of Beast Linear Unbiased Estimator (BLUE), because of the Outliers have a bad effect on the phenomenon. To address this problem, new statistical methods have been developed so that they are not easily affected by outliers. These methods are characterized by robustness or (resistance). The Least Trimmed Squares: LTS method was therefore a good alternative to achieving more feasible results and optimization. However, it is possible to assume weights that take into consideration the location of the outliers in the data and det
... Show MoreThe research aims to presenting a number of scenarios for the investment of the marshes. The problem of research problem was that there is no in-depth analysis of the marshes environment. The traditional methods of the environmental analysis are insufficient. The research community is represented by the decision makers in Maysan Governorate. The research led to proposing of three scenarios with statement the requirements for the success of each one. The most important conclusions are that the three proposed scenarios for marshes investment depend on the availability of the required volunteers for each scenario. The higher the availability of the requirements, the more optimistic the scenario becomes. If t
... Show MoreWastewater recycling for non-potable uses has gained significant attention to mitigate the high pressure on freshwater resources. This requires using a sustainable technique to treat natural municipal wastewater as an alternative to conventional methods, especially in arid and semi-arid rural areas. One of the promising techniques applied to satisfy the objective of wastewater reuse is the constructed wetlands (CWs) which have been used extensively in most countries worldwide through the last decades. The present study introduces a significant review of the definition, classification, and components of CWs, identifying the mechanisms controlling the removal process within such units. Vertical, horizontal, and hybrid CWs
... Show More