Two simple, rapid, and useful spectrophotometric methods were suggest or the determination of sulphadimidine sodium (SDMS) with and without using cloud point extraction technique in pure form and pharmaceutical preparation. The first method was based on diazotization of the Sulphdimidine Sodium drug by sodium nitrite at 5 ºC, followed by coupling with α –Naphthol in basic medium to form an orange colored product . The product was stabilized and its absorption was measured at 473 nm. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.03012 μg∙cm-1, the detection limit was 0.0277 μg∙ml-1, and the limit of Quantitation was 0.03605μg∙ml-1.The second method was the cloud point extraction (CPE) using Trtion X-114 as surfactant. Beer’s law was obeyed in the concentration range of (1-12) μg∙ml-1. Sandell’s sensitivity was 0.02958 μg∙cm-1, the detection limit was 0.01745 μg∙ml-1, and the limit of quantitation was 0.028303 μg∙ml-1. All variables including the reagent concentration, reaction time, color stability period, and mole ratio were studied in order to optimize the reaction conditions. The mole ratio for the composition of product is (1:1). Both methods were effectively useful to the determination of sulphdimidine sodium in pharmaceutical dose form. The attained results were in a good agreement with the official and other methods in the literature .No interference were observed from the commonly encountered additives and excipients.
IA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreIn most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show MoreThis paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-
... Show MoreThe Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show MoreThis article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while
... Show MoreThere is an interesting potential for the use of GFRP-pultruded profiles in hybrid GFRP-concrete structural elements, either for new constructions or for the rehabilitation of existing structures. This paper provides experimental and numerical investigations on the flexural performance of reinforced concrete (RC) specimens composite with encased pultruded GFRP I-sections. Five simply supported composite beams were tested in this experimental program to investigate the static flexural behavior of encased GFRP beams with high-strength concrete. Besides, the effect of using shear studs to improve the composite interaction between the GFRP beam and concrete as well as the effect of web stiffeners of GFRP were explored. Encasing the GFRP
... Show More