In current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organic solvent (500mL/sample) provides an environmentally friendly and low-cost preconcentration method. The suggested method was utilized for analyzing of MCP in commercial pharmaceutical injections.
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe focus of this article, reviewed a generalized of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm, scheme algorithm Modified scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.
In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreA simple, environmental friendly and selective sample preparation technique employing porous membrane protected micro-solid phase extraction (μ-SPE) loaded with molecularly imprinted polymer (MIP) for the determination of ochratoxin A (OTA) is described. After the extraction, the analyte was desorbed using ultrasonication and was analyzed using high performance liquid chromatography. Under the optimized conditions, the detection limits of OTA for coffee, grape juice and urine were 0.06 ng g−1, 0.02 and 0.02 ng mL−1, respectively while the quantification limits were 0.19 ng g−1, 0.06 and 0.08 ng mL−1, respectively. The recoveries of OTA from coffee spiked at 1, 25 and 50 ng g−1, grape juice and urine samples at 1, 25 and 50 ng mL
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreThe research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differenc
... Show MoreDue to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show MoreA common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c