Two simple, rapid, and useful spectrophotometric methods were suggest or the determination of sulphadimidine sodium (SDMS) with and without using cloud point extraction technique in pure form and pharmaceutical preparation. The first method was based on diazotization of the Sulphdimidine Sodium drug by sodium nitrite at 5 ºC, followed by coupling with α –Naphthol in basic medium to form an orange colored product . The product was stabilized and its absorption was measured at 473 nm. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.03012 μg∙cm-1, the detection limit was 0.0277 μg∙ml-1, and the limit of Quantitation was 0.03605μg∙ml-1.The second method was the cloud point extraction (CPE) using Trtion X-114 as surfactant. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.02958 μg∙cm-1, the detection limit was 0.01745 μg∙ml-1, and the limit of quantitation was 0.028303 μg∙ml-1. All variables including the reagent concentration, reaction time, color stability period, and mole ratio were studied in order to optimize the reaction conditions. The mole ratio for the composition of product is (1:1). Both methods were effectively useful to the determination of sulphdimidine sodium in pharmaceutical dose form. The attained results were in a good agreement with the official and other methods in the literature .No interference were observed from the commonly encountered additives and excipients.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreArcHydro is a model developed for building hydrologic information systems to synthesize geospatial and temporal water resources data that support hydrologic modeling and analysis. Raster-based digital elevation models (DEMs) play an important role in distributed hydrologic modeling supported by geographic information systems (GIS). Digital Elevation Model (DEM) data have been used to derive hydrological features, which serve as inputs to various models. Currently, elevation data are available from several major sources and at different spatial resolutions. Detailed delineation of drainage networks is the first step for many natural resource management studies. Compared with interpretation from aerial photographs or topographic maps, auto
... Show MoreThe percentage of fatty acids, quantity of tocopherols, tocotrienols, carotens and physiochemical characteristics of crude red palm oil have been evaluated, in addition to specific chemical detection of active compounds unsaponifiable matters. Results of Gas Liquid Chromatography showed:- The major fatty acids in red palm oil is palmitic (44.36%) then oleic (39.65%), linolenic (10.55%), stearic (3.56%), myristic (1.22%), arachdonic (0.24%) and palmotic (0.19%). Red palm oil contains ? – ?- ?- ? – Tocopherols with concentration 258 , 121 , 259, 109 m/kg oil , ? – ?- ?- ? – Tocotrienol with concentration 462.77 , 571.03, 619.18, 509.07 m/kg oil respectively. Total tocopherols & tocotrienols 2909.05 m/kg oil and
... Show MoreResearchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped
The aim of the research is to identify the reality of administrative motivation for the deans of the faculties of physical education and sports sciences at the universities of Baghdad and Al-Mustansiriya from the point of download of the faculty members. The number of the exploratory sample was (7) faculty members, they were taken in a random way, while the rest of the sample number was (150) faculty members who considered the application sample for the scale, and the two researchers also adopted a questionnaire for the scale and it is applied to the Iraqi environment. phrase, which are phrases that are interrelated with the administrative leadership motivation in the faculties of physical education and sports sciences. The researchers did
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.