This study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This method has an average recovery percentage by 104%. This result was also supported by the precision, linearity, LOD and LOQ, i.e. 0.0775; 0.968; 0.00000256 and 0.000000775, respectively.
The agriculture around the world faced many difficulties and the important was to reduce inputs of chemical fertilizers and pesticides and increase the total yield specially with the continuous grow of populations numbers at the world expected to reach more than 9 billion by 2050. In other hand there are other problems which make the challenges bigger such as wars, biotic and abiotic stress, and diseases. The scientists tried to find solutions by using Nano-fertilization which consider a modern way to quickly grow up the yield and decrease use the chemicals. The use of nanotechnology may be destructive on human and the environment due to fast accumulation in the tissues of alive bodie
Background: Diabetes mellitus is a chronic metabolic disorder of the carbohydrate, protein and fat metabolism, resulting in increased blood glucose levels. Various complications of diabetes have been described with periodontitis being added as the sixth complication of diabetes mellitus. Matrix metalloproteinase-8 (MMP-8) has been identified as major tissue-destructive enzyme in periodontal disease. MMP-8 is released from neutrophils in a latent, inactive pro form and becomes activated during periodontal inflammation by independent and/or combined actions of host-derived inflammatory mediators .C-reactive protein is a systemic marker released during the acute phase of an inflammatory response. Subjects, materials and methods: Total samples
... Show MoreFor many problems in Physics and Computational Fluid Dynamics (CFD), providing an accurate approximation of derivatives is a challenging task. This paper presents a class of high order numerical schemes for approximating the first derivative. These approximations are derived based on solving a special system of equations with some unknown coefficients. The construction method provides numerous types of schemes with different orders of accuracy. The accuracy of each scheme is analyzed by using Fourier analysis, which illustrates the dispersion and dissipation of the scheme. The polynomial technique is used to verify the order of accuracy of the proposed schemes by obtaining the error terms. Dispersion and dissipation errors are calculated
... Show MoreIn this study, the mechanical properties of an epoxy and unidirectional woven carbon with fiberglass composite were experimentally investigated. When preparing the composite samples, American Society for Testing and Materials (ASTM)standard was used. Tensile, impact and flexural test were conducted to investigate the mechanical properties of the new produced epoxy Unidirectional Woven Carbon and Epoxy Fiberglass composites. The outcome showed that the strength of the produced samples increased with the increase in the number of unidirectional woven carbon layers added. Two methods were utilized: (1) woven carbon composite with glass fiber (2) woven carbon composite). The two methods of composite were compared with each other. The resul
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Nowadays, energy demand continuously rises while energy stocks are dwindling. Using current resources more effectively is crucial for the world. A wide method to effectively utilize energy is to generate electricity using thermal gas turbines (GT). One of the most important problems that gas turbines suffer from is high ambient air temperature especially in summer. The current paper details the effects of ambient conditions on the performance of a gas turbine through energy audits taking into account the influence of ambient conditions on the specific heat capacity ( , isentropic exponent ( ) as well as the gas constant of air . A computer program was developed to examine the operation of a power plant at various ambient temperature
... Show MoreNature and natural beauty have always been the source of inspiration for poets and mystics. For them, nature is one of the most recurrent and celebrated themes. It is a significant symbol of the beauty, righteousness and freshness they are looking for. For religious and mystical poets, it is a reference to God, his beauty, and splendour. Comparing it with the scripture, Thomas Ryan, a Catholic priest and a mystical writer, says ''The Bible is the 'small book', the world of nature is the 'big book'. Both reveal the Creator.''1
For Muslim mystics, God does exist everywhere as the Qur'an states: ''Wherever (Whithersoever) you turn, there is God's face” (Chapter (Surah): 2
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreThe purpose of this research work is to synthesize conjugates of some NSAIDs with sulfamethoxazole as possible mutual prodrugs to overcome the local gastric irritation of NSAID with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo group that undergo reduction only by colonic bacterial azo reductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon).
Key words: Mutual prodrug, Ester linkage, Azo bond, Colon targeting