The simple and available technique of colorimetry and indirect X-ray fluorescence determination of tetracycline hydrochloride (in the form of colored complex with iron(III) ions) and cyanocobalamine (in the form of the colored thiocyanate complex with cobalt(II) ions) is offered. The analytes were separated from the accompanying components by sorption to polyurethane foam based on ethers. The conditions of sorption separation and measurement of analytical signal of these substances are optimized. The obtained results of tetracycline drugs and injection solution B12 vitamin are in satisfactory agreement with data declared by the manufacturer.
This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type (5052-O).
The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot. &nbs
... Show MoreAzo ligand 11-(4-methoxyphenyl azo)-6-oxo-5,6-dihydro-benzo[4,5] imidazo[1,2-c] quinazoline-9-carboixylic acid was derived from 4-methoxyaniline and 6-oxo-5,6-dihydro-benzo[4,5]imidazo[1,2-c]quinazoline-9-carboxylic acid. The presence of azo dye was identified by elemental analysis and spectroscopic methods (FT-IR and UV-Vis). The compounds formed have been identified by using atomic absorption in flame, FT.IR, UV-Vis spectrometry magnetic susceptibility and conductivity. In order to evaluate the antibacterial efficiency of ligand and its complexes used in this study three species of bacteria were also examined. Ligand and its complexes showed good bacterial efficiencies. From the obtained data, an octahedral geometry was proposed for all p
... Show MorePreviously, many empirical models have been used to predict corrosion rates under different CO2 corrosion parameters conditions. Most of these models did not predict the corrosion rate exactly, besides it determined effects of variables by holding some variables constant and changing the values of other variables to obtain the regression model. As a result the experiments will be large and cost too much. In this paper response surface methodology (RSM) was proposed to optimize the experiments and reduce the experimental running. The experiments studied effects of temperature (40 – 60 °C), pH (3-5), acetic acid (HAc) concentration (1000-3000 ppm) and rotation speed (1000-1500 rpm) on CO2 corrosion performance of t
... Show MoreThe research abstract included introduction and the importance of the research, also included display of the problem represented by weakness for the players when performing some of the basic skills in badminton and the shuttle not reaching to the back corners of the court which gives the player the opportunity to win through applying the pressure on the opponent and make him away from the control center(T) which definitely required level of a collection muscular strength contributed in performance perhaps this related to a number of reasons related with weakness in physical changes especially explosive and characterized by speed forces for the badminton players and be acquainted with them and knowing the extent of their effect in performanc
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More