A simple and highly sensitive cloud point extraction process was suggested for preconcentration of micrograms amount of isoxsuprine hydrochloride (ISX) in pure and pharmaceutical samples. After diazotization coupling of ISX with diazotized sulfadimidine in alkaline medium, the azo-dye product quantitatively extracted into the Triton X-114 rich phase, dissolved in ethanol and determined spectrophotometrically at 490 nm. The suggested reaction was studied with and without extraction and simple comparison between the batch and CPE methods was achieved. Analytical variables including concentrations of reagent, Triton X-114 and base, incubated temperature, and time were carefully studied. Under the selected optimum conditions, the linearity ranges of calibration curves were 1-9 and 0.5-8 µg/mL with detection limits of 0.26 and 0.09 µg/mL of ISX for batch and CPE methods respectively. A relative standard deviation (RSD %) best than 1.98 and 2.67 % with the percentage recoveries range 100.14 and 99.63 % were obtained for both methods respectively. The proposed methods were successfully used in routine analysis of ISX in pharmaceutical forms with high accuracy and reproducibility.
An accurate and sensitive spectrophotometric method has been developed for the determination of carbamazepine (CRN.) in pure and dosage forms. The method is based on the oxidation of 2,4-dinitrophenylhydrazine (2,4-DNPHz) by potassium periodate than coupling with carbamazepine (CRN.) in alkaline medium to form a stable yellowish brown colored water-soluble dye with a maximum absorption at 485 nm. The variables that affect the completion of reaction have been carefully optimized. Beer’s law is obeyed over the concentration range of (4-50 μg.mL-1) with molar absorptivity of (6.7335×103 L.mol-1.cm1). The limit of detection was (0.1052 μg.mL-1) and Sandell’s sensitivity value was 0.0350 μg.cm-2.The proposed method
... Show MoreAn accurate and sensitive spectrophotometric method has been developed for the determination of carbamazepine (CRN.) in pure and dosage forms. The method is based on the oxidation of 2,4-dinitrophenylhydrazine (2,4-DNPHz) by potassium periodate than coupling with carbamazepine (CRN.) in alkaline medium to form a stable yellowish brown colored water-soluble dye with a maximum absorption at 485 nm. The variables that affect the completion of reaction have been carefully optimized. Beer’s law is obeyed over the concentration range of (4-50 μg.mL-1) with molar absorptivity of (6.7335×103 L.mol-1.cm1). The limit of detection was (0.1052 μg.mL-1) and Sandell’s sensitivity value was 0.0350 μg.cm-2.
... Show MoreCrab shells were used to produce chitosan via the three stages of deproteinization, demineralization and deacetylation using sodium hydroxide and hydrochloric acid under different treatment conditions of temperature and time. The produced chitosan was characterized using Fourier transform infrared spectroscopy (FTIRS), X-ray diffraction (XRD), high – resolution scanning electron microscopy (HRSEM), electron dispersion spectroscopy (EDS), dynamic light scattering (DLS), Brunauer Emmett Teller (BET) and Thermogravimetric analysis (TGA). The adsorption behavior of chitosan to remove arsenic (As) and copper (Cu) from electroplating wastewater was examined by batch adsorption process as a function of adsorbent dose, contact time and te
... Show MoreMaximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show More