A new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the determination of propranolol at concentration ( 5,7 and 10) mmol/L respectively to cell A and cell B. The results were compared with classical methods UV- Spectrophotometric at max=289 nm and turbidmetric method by using method standard addition via t-test at 95% level confidence. The comparison of dataexplain that long distance chasing photometer (NAG-ADF-300-2) is the choice with excellent extended detection and wide application.
This paper deals with the nonlinear large-angle bending dynamic analysis of curved beams which investigated by modeling wave’s transmission along curved members. The approach depends on the wave propagation in one-dimensional structural element using the method of characteristics. The method of characteristics (MOC) is found to be a suitable method for idealizing the wave propagation inside structural systems. Timoshenko’s beam theory, which includes transverse shear deformation and rotary inertia effects, is adopted in the analysis. Only geometrical non-linearity is considered in this study and the material is assumed to be linearly elastic. Different boundary conditions and loading cases are examined.
From the results obtai
... Show MoreThe researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
There is a continuous and massive need for newer cephalosporins that should have resistance against β-lactamases and can be used orally. An approach of using cephalexin, as a well-studied and potent antibacterial compound is considered to prepare new designed derivatives. These derivatives include the incorporation of amino acid moiety linked through an amide bond with the α-amino group of cephalexin. Certain aliphatic amino acids were used, such as glycine, alanine, valine and proline. The chemical structures of these derivatives were confirmed by IR spectroscopy and elemental analyses. All the synthesized compounds were subjected for preliminary evaluation of antimicrobial activity using well diffusion method, against certa
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show More