A simple, low cost and rapid flow injection turbidimetric method was developed and validated for mebeverine hydrochloride (MBH) determination in pharmaceutical preparations. The developed method is based on forming of a white, turbid ion-pair product as a result of a reaction between the MBH and sodium persulfate in a closed flow injection system where the sodium persulfate is used as precipitation reagent. The turbidity of the formed complex was measured at the detection angle of 180° (attenuated detection) using NAG dual&Solo (0-180°) detector which contained dual detections zones (i.e., measuring cells 1 & 2). The increase in the turbidity of the complex was directly proportional to the increase of the MBH concentration
... Show MoreAbstract
The research aims to study the problem of high production costs and low quality and the use of total quality management tools to detect problems of the high cost of failure and low quality products, diagnosis, and developing appropriate solutions.
To achieve the goal, we studied the overall quality tools and its relationship with the costs and the possibility of improving quality through the use of these tools.
Was limited to these tools and study the relation to the reduction of costs and improving quality have been studied serially by the possibility of the reduction.
To achieve the goal, the study of the concept of total quality management
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreIn this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreThis paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn Indonesia, cattle feces (CF) and water hyacinth (WH) plants are abundant but have not been widely revealed. The use of microorganisms as decomposers in the fermentation process has not been widely applied, so researchers are interested in studying further. This study was to evaluate the effect of the combination of CF with WH on composting by applying white-rot fungal (WRF) (Ganoderma sp) microorganism as a decomposer. A number of six types of treatment compared to R1(ratio of CF:WH)(25%:75%)+WRF; R2(ratio of CF:WH)(50%:50%)+WRF; R3(ratio of CF:WH)(75%:25%)+WRF; R4(ratio of CF:WH)(25%:75%) without WRF; R5(ratio of CF:WH)(50%:50%) without WRF; R6(ratio of CF:WH)
... Show More