A procedure for the mutual derivatization and determination of thymol and Dapsone was developed and validated in this study. Dapsone was used as the derivatizing agent for the determination of thymol, and thymol was used as the derivatizing agent for the determination of Dapsone. An optimization study was performed for the derivatization reaction; i.e., the diazonium coupling reaction. Linear regression calibration plots for thymol and Dapsone in the direct reaction were constructed at 460 nm, within the concentration range of 0.3-7 μg ml-1 for thymol and 0.3-4 μg ml-1 for Dapsone, with limits of detection 0.086 and 0.053 μg ml-1, respectively. Corresponding plots for the cloud point extraction of thymol and Dapsone were constructed at 460 nm, within the concentration range of 0.1-2 μg ml-1 for thymol and 0.1-1.8 μg ml-1 for Dapsone, with limits of detection 0.0445 and 0.023 μg ml-1, respectively. Correlation coefficients and molar absorptivities were improved using cloud point extraction. The proposed method can be applied for their trace detection in different matrices.
A new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .
The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica
... Show More<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>
The aim of the present work is concerned with the effect of ?-irradiation on PM-355 with absorbed dose of (30-160Mrad) range. This polymer is evaluated spectrophotometrically for use as high dose dosimeters. The absorption spectra of irradiated samples showed radiation induced absorption changes. There is an increment in absorption proportional with absorbed dose. This increment is attributed to interfaces traps which, are formed by irradiation. Calibration curve was drawn .The linear relation was found in calibration curve, and dosimeter range was determined from the linear part. The linearity in response curve suggested that PM-355 could be used as dosimeter within (30-160Mrad) rang. Energy gap shift was used as a second tool to determin
... Show MoreThe present paper focuses on the study of some characteristics of
comets ions by photometry method which represent by CCD camera
which it provide seeing these images in a graded light. From 0-255
when Zero (low a light intensity) and 255 (highlight intensity). These
differences of photonic intensity can be giving us a curve which
appear from any line of this image.
From these equations the focus is concentrating on determine the
temperature distribution, velocity distribution, and intensity number
distribution which is give number of particles per unit volume.
The results explained the interaction near the cometary nucleus
which is mainly affected by the new ions added to the density of the
solar wind, th
Background: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreThe main objective of this work is to introduce and investigate fixed point (F. p) theorems for maps that satisfy contractive conditions in weak partial metric spaces (W.P.M.S), and give some new generalization of the fixed point theorems of Mathews and Heckmann. Our results extend, and unify a multitude of (F. p) theorems and generalize some results in (W.P.M.S). An example is given as an illustration of our results.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More