The extraction of pesticides is a critical and urgent issue in the preparation for and determination of pesticide residues. The lack of a quick, easy, and successful extraction process is the most critical and challenging problem, even if diagnostic tools have improved and pesticide residues have been better understood. This study contrasted the QuEChERS method, which uses gas chromatography with a flame ionization detector, with the LLE method, which uses liquid-liquid extraction, in order to extract pyridaben from cucumbers and spiromesifen from tomatoes. The GC-FID device was employed to ascertain the spiromesifen LOD and LOQ, which were 0.002 μg mL-1 and 0.006 g mL-1, respectively, according to the findings from the QuEChERS technique (95.6% recovery, RSD 0.28%-1.95%) and the LLE method (85.4% recovery, RSD 0.25%-6.9%). When testing the cucumber sample for pyridaben, the LLE method yielded an RSD of 0.12-0.21 percent, while the QuEChERS method yielded 95.22 percent. Pyridaben has limits of detection (LOD) of 0.001 μg mL-1 and quantification (LOQ) of 0.003 μg mL-1. A higher recovery level in both samples suggests that the QuEChERS method may be preferable to the LLE for extracting spiromesifen from tomatoes and pyridaben from cucumbers, according to the data. This was followed by a comparison of the two sets of results using a paired t-test with a 95% confidence level. Thus, the two methods are statistically distinct at the 95% confidence level. Among the most environmentally safe and sustainable solutions in this field, the QuEChERS method stands out for its quick sample preparation, affordability, ease of use, effectiveness, and absence of toxic chemicals and solvents.
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThe present study aimed to investigate the anatomy, histology, and immunohistochemistry of parathyroid gland in two Iraqi mammals (Weasel, Herpestes javanicus and Long-ear hedgehog, Hemiechinus auritus) as a comparative study. A total of (20) animal for each species were used in the present study. Animals collected were immediately anesthesia and dissected to get the parathyroid gland. Methods of Humason and Bancroft and Stevens were employed for histological techniques. Different stains were used (Hematoxylin- Eosin stain-(H & E), Periodic Acid Schiff stain-(PAS), Azan stain, and Methyl Blue stain-(MB)) for staining the histological sections. Anti-calcitonin, code140778 marker used for immune-histochemical study. Results of the present stu
... Show MoreThe methods used by the print media (press) is varied in conveying its messages and its orientations to the readers. But language takes the leading method among these methods, or a real competitor - so far - due to the characteristics and advantages of languages, including: ease, abbreviation, and development, etc.
In the midst of such events, political tensions, and what they carry of the global developments, and among which was the most important the fall of the former Iraqi regime in the spring of 2003, the press had the greatest share, and a large portion on the level of monitoring, analyzing, and interpreting the various consequences of the event. The interpreting of the news varies according to the evolving political trends
... Show MoreThe main object of the current work was to determine the antifungal efficiency of secondary metabolites product called synephrine that extracted from Citrus sinesis peels and the ability of synephrine to biosynthesis gold nanoparticles from HAucl4 which consider environmentally favourable method, then determine their activity against pathogenic human dermatophyte. The identification of synephrine done by Thin layer chromatography (TLC), High Performance Liquid Chromatography (HPLC) and The Fourier Transform Infrared (FTIR). The characterization of gold nanoparticles by using Ultra Violet-Visible Spectroscopy (UV-Vis), Field – Emission Scanning Electron Microscopy (FESEM) and Fourier Transform Infrared (FTIR), confirmed the biosynt
... Show MoreStudy showed structure of pecten oculi in the Kestrel Falco tinnunculus L.was
Pleated type and consisted of 17 folds which were thick. While in the Collared Dove
Streptopelia decaocto F. was Vaned type and consisted of 13 folds and it described
thin. The illustrated histological study of pecten oculi folds in the Kestrel and the
Collared Dove was composed of large number of capillaries, large blood vessels and
pigment cells which were few in Kestrel compare with the Collared Dove. The bridge
in the Kestrel and the Collared Dove pecten oculi was consisted of connective tissue,
many pigment cells, and contains on little capillaries and it linked the membrane to
the internal limiting membrane of the retina in the Kes
With the increasing use of antibiotics around the world, the study and appreciation of antibiotics has become essential. An antibiotic formulation may include one or added active ingredients depending on the type and method of manufacturing the antibiotic. Antibiotics can only combat diseases of bacterial origin. As for viral diseases such as the common cold and influenza, antibiotics will not be able to combat them. The objective of this review is to digest the literature related to estimation of antibiotics and to show the methods that have been used in the estimation of the antibiotics (amoxicillin, ampicillin, cephalothin, carbenicillin, and cefotaxime) in medicinal preparations and a biological fluid for example blood
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.