Two simple, rapid, and useful spectrophotometric methods were suggest or the determination of sulphadimidine sodium (SDMS) with and without using cloud point extraction technique in pure form and pharmaceutical preparation. The first method was based on diazotization of the Sulphdimidine Sodium drug by sodium nitrite at 5 ºC, followed by coupling with α –Naphthol in basic medium to form an orange colored product . The product was stabilized and its absorption was measured at 473 nm. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.03012 μg∙cm-1, the detection limit was 0.0277 μg∙ml-1, and the limit of Quantitation was 0.03605μg∙ml-1.The second method was the cloud point extraction (CPE) using Trtion X-114 as surfactant. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.02958 μg∙cm-1, the detection limit was 0.01745 μg∙ml-1, and the limit of quantitation was 0.028303 μg∙ml-1. All variables including the reagent concentration, reaction time, color stability period, and mole ratio were studied in order to optimize the reaction conditions. The mole ratio for the composition of product is (1:1). Both methods were effectively useful to the determination of sulphdimidine sodium in pharmaceutical dose form. The attained results were in a good agreement with the official and other methods in the literature .No interference were observed from the commonly encountered additives and excipients.
Sulfamethoxazole (SMX) was added to P-N,N-dimethyl amino benzaldehyde (PDAB) by condensation reaction in acidic medium to form, a yellow colored dye compound which exhibits maximum absorption (λmax) at 450.5 nm. The concentration of (SMX) was determined spectrophotometrically. The optimum reaction conditions and other analytical parameters were evaluated. In addition to classical univariate optimization, design of experiment method has been applied in optimization of the variables affecting the color producing reaction. Beer’s law obeyed in the concentration range of 0.1-10 μg.mL-1 with molar absorptivity of 5.7950×104 L.mol-1.cm-1. The limit of detection and Sandell's sensitivity value were 0.078 μ
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreThe H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.
X-ray phase analysis was used to analyse the composition of Pb8Na(2±x)(PO4)6 (lead-sodium apatite structure) with different X values (X values refer to changes in the excess or lack of sodium (2±X) in the apatite structure): -0.15, -0.10, -0.05, 0.00, +0.05, +0.10, and +0.15. The ceramic method (solid-state reaction) was used to synthesize all samples at a temperature of 800 °C. Many programs, such as match software (v.3), PDF-4 database (ICCD), and database PDF-4 (ASTM), were used to study the single phases. The least-squares method was used to calculate the unit cell parameters. Results have shown that the following compositions: Pb8Na2(PO4)6<
... Show MoreJournal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MorePlaying is the only common language among children in every place and time, to the fact that what distinguishes the children is their quest to play and fun way innate, not acquired, which is expressed with the child really is one of the rights. And play a key entrance to the growth of the child mentally, intellectually and cognitively and not for the child emotionally and socially just. In the play the child begins to identify and classify objects and learn concepts and circulate among themselves on a linguistic basis. Activity here and play a major role in leading the linguistic development of the child in the composition has the communication skills.
The Games (especially intellectual ones) Whatever the cause of the development
... Show MoreSome have considered the dialectic in form and meaning from different points of view, and dismantled them from each other, and this view is correct if we adopt according to the logic of Aristotle when it comes to dialectic, the dialectic of form and meaning has different aspects and does not share a single line in terms of conceptual meaning, the form is the appearance What the recipient sees with the help of cognitive tools, the content or content is the mental meaning, which in turn depends on his own tools, and to this extent this view is correct, and the intellectual content or meaning of the artwork or the human message that the artist wants to convey to the viewer.
The research included four chapters. The first chapter included
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show More