A sensitive, accurate, and affordable colorimetric method was developed for assaying prednisolone (PRZ) in various medicinal forms. The procedure involves the oxidation of PRZ by ferric ions, followed by complexation of the resulting ferrous ions with ferricyanide to produce a greenish-blue product. Common complexation conditions were thoroughly investigated. The mole ratio of FeCl₃·6H₂O to K₃Fe(CN)₆ was 8:1. The proposed mechanism of complexation was suggested and considered. Various parameters were optimized, including the reduction of the colorimetric reaction temperature to 50°C and the duration of heating and analysis to 20-30 minutes. The calibration curve was linear over the range of 1-60 µg/mL. The limit of detection (LOD) and the limit of quantification (LOQ) were 0.5 μg/mL and 1 μg/mL, respectively. Spiking actual samples with standard PRZ showed recoveries within the 97.3-100.1% range. The method exhibited high precision, with an RSD% of less than 1.5%. Additionally, the study confirmed that common pharmaceutical excipients did not interfere. Real medicinal samples, including tablets, syrup, eye drops, and creams, were successfully examined for direct analysis of PRZ using the developed methodology, demonstrating its suitability for routine analysis of various PRZ-containing drug formulations.
The dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreLow oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).
This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p
... Show MoreThe main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady. Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.
This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023