طريقة سهلة وبسيطة ودقيقة لتقدير السبروفلوكساسين في وجود السيفاليكسين او العكس بالعكس في خليط منهما. طبقت الطريقة المقترحة بطريقة الاضافة القياسية لنقطة بنجاح في تقدير السبروفلوكساسين بوجود السيفاليكسين كمتداخل عند الاطوال الموجية 240-272.3 نانوميتر وبتراكيز مختلفة من السبروفلوكساسين 4-18 مايكروغرام . مل-1 وكذلك تقدير السيفاليكسين بوجود السبروفلوكساسين الذي يتداخل باطوال موجية 262-285.7 نانوميتر وبتراكيز مختلفة من السيفاليكسين 6-18 مايكروغرام . مل-1 في مزيج لهما. اظهرت النتائج عدم وجود اي تداخلات من قبل المواد المضافة التي تحتويها الادوية على هذه المركبات وضمن حدود كشف السبروفلوكساسين يساوي 0.1732 مايكروغرام . مل-1 وعقارالسيفاليكسين يساوي 0.4620 مايكروغرام . مل-1 . الانحراف القياسي النسبي المئوي اقل من 2% . تم تطبيق الطريقة بنجاح لتقدير العقارين في بعض المستحضرات الصيدلانية. تعتبر الطريقة المقترحة من الطرق القليلة التكلفة وعدم حاجتها الى ادخال الادوية في سلسلة من التفاعلات وتثبيت لظروف التفاعل لغرض تقديرها وانما تتم عن طريق تقدير الدواء بعد اذابته مباشرة في الماء المقطر بوجود العقار الاخر معه في مزيج وتعتبر من الطرق الناجحة في التقدير خاصة للادوية المتقاربة في طيف الامتصاص لها والتي من غير الممكن ايجاد طرق لفصل الدوائين وتقديرهما بصورة ادق من هذه الطريقة المقترحة دون التداخل وتاثير احدهما على الاخر. الطريقة المقترحة في هذا البحث كانت ناجحة في تقدير كل من السبروفلوكساسين والسيفاليكسين في مزيج لهما دون تداخل دواء مع الاخر.
This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MoreHeuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreIn this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
In this paper, the proposed phase fitted and amplification fitted of the Runge-Kutta-Fehlberg method were derived on the basis of existing method of 4(5) order to solve ordinary differential equations with oscillatory solutions. The recent method has null phase-lag and zero dissipation properties. The phase-lag or dispersion error is the angle between the real solution and the approximate solution. While the dissipation is the distance of the numerical solution from the basic periodic solution. Many of problems are tested over a long interval, and the numerical results have shown that the present method is more precise than the 4(5) Runge-Kutta-Fehlberg method.
The removal of heavy metal ions from wastewater by ion exchange resins ( zeolite and purolite C105), was investigated. The adsorption process, which is pH dependent, shows maximum removal of metal ions at pH 6 and 7 for zeolite and purolite C105 for initial metal ion
concentrations of 50-250 mg/l, with resin dose of 0.25-3 g. The maximum ion exchange capacity was found to be 9.74, 9.23 and 9.71 mg/g for Cu2+, Pb2+, and Ni2+ on zeolite respectively, while on purolite C105 the maximum ion exchange capacity was found to be 9.64 ,8.73 and 9.39 for Cu2+, Pb2+, and Ni2+ respectively. The maximum removal was 97-98% for Cu2+ and Ni2+ and 92- 93% for Pb2+ on zeolite, while it was 93-94% for Cu2+, 96-97% for Ni2+, and 87-88% for Pb2+ on puroli
In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show More