In this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of methods were carefully studied. Using optimal conditions, the linearity of calibration curves was in the range of 0.4-13 and 0.05-4µg/mL and limits of detection of 0.044 and 0.028 µg/mL of MTH for batch and CPE methods respectively. Average recoveries for samples were detected to be between 97-101 %for both methods, with the relative standard deviation (RSD %) best than 2.7 % and 4.5 % for both methods, respectively. The suggested methods were applied successfully for assay of MTH in commercial pharmaceutical tablets.
In this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreHedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreSynthesis, characterization and pharmaceutical studies of schiff base from 2-pyrrolidinone derivative and imidazole-2-carboxaldehyde and corresponding complexes with Metal (||)
Supernova explosions are described as very violent events which transfer a significant amount of energy to interstellar media and are responsible for a large variety of physical processes. This study does not discuss the actual explosion mechanisms but follows the behavior of the dynamical evolution of some selected type I and type II supernova remnant and particularly after a thousand years from their explosion and shows how the density of the medium affects the evolution and the lifetime of each remnant. By studying such behaviors, a simplified model has been proposed here for the velocity and radius of the remnant after thousand years of explosion that depends only on the density of the medium and age of the remnant. It has been found th
... Show MoreThis paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
Isolation had been done for active substances from Thyme plant (Thymus Vulgaris) such as volatile oils, Saponins and Tannins. The percentage in form was (21.1%),(59.2%),( 9.7%) respectively. Also a study of anti-bacterial activity of extracts from Thyme using two types of pathogenic bacteria Escherichia Coli and aurous Staphylococcus showed the ability of inhibition for all different extracts by vary inhibition diameters for different active substances, concentrations and bacteria. One type of cancer cellular line used to study the effect of Thyme extracts on the growth of cells in the laboratory and thus know the specifications of extracts as anti-tumor, (L20B) cell line have been used which is mice Transformed cell Line. The possibility o
... Show More