Based on the diazotization-coupling reaction, a new, simple, and sensitive spectrophotometric method for determining of a trace amount of (BPF) is presented in this paper. Diazotized metoclopramide reagent react with bisphenol F produces an orange azo-compound with a maximum absorbance at 461 nm in alkaline solution. The experimental parameters were optimized such as type of alkaline medium, concentration of NaOH, diazotized metoclopramide amount, order additions, reaction time, temperature, and effect of organic solvents to achieve the optimal performance for the proposed method. The absorbance increased linearly with increasing bisphenol F concentration in the range of 0.5-10 μg mL-1 under ideal conditions, with a correlation coefficient of 0.9931 and a detection limit of 0.15 μg mL-1. The effect of different temperatures and different extraction time was studied on the leaching out and the data indicates that as time and temperature rising, the concentration of BPF leached out of all thermal papers increased. To confirm that extracts from thermal papers contained BPF, samples containing the analytic were subjected to high-performance liquid chromatography (HPLC-UV detector) analysis. The analysis was carried out on a C18 column with a mobile phase of acetonitrile/water (55/45v:v), and the detection was conducted spectrophotometrically at 230 nm. The retention time of standard BPF was determined to be 5.649 min and the peak eluting time for most thermal papers extract was at 5.6 minutes, demonstrating that BPF was present in the thermal papers. The method was applied to quantify the proposed analyses in a variety of samples with excellent results.
The importance of the research in the preparation of special exercises to develop some types of basketball scoring as a contribution to help the physical education teacher to find successful educational alternatives. The purpose of the study was to prepare special exercises for the cognitive (cognitive) survey in the development of motor satisfaction and learning some types of Scoring for basketball for students. Learn about the effect of cognitive exercises in cognitive development in students. The survey included students from the first stage of the Faculty of Physical Education and Sports Science \ University of Diyala (159) divided into 6 people. The sample was randomized by (b) and (b) D) and after dispersion by the standard method In
... Show MoreObjectives: To determine the (QoL) for patients with permanent pacemaker and to find-out the relationship between
these patients’ (QoL) and their sociodemographic characteristics such as age, gender, level of education, and
occupation.
Methodology: ٨ purposive non-probability” sample of (62) patient with permanent pacemaker was involved in this
study. The developed questionnaire consists of (4) parts which include !.demographic data form, 2.disease-related
information form, 3.socioeconomic data form, and 4.Permanent pacemaker patient’s quality of life questionnaire data
form. The validity and reliability of the questionnaire were determined through the application of a pilot study. ٨
descriptive statistical a
Background: Listeria monocytogenes, a member of the genus Listeria, is widely distributed in agricultural environments, such as soil, manure and water. The genus of Listeria bacteria is about 15-17 species. It is a pathogenic bacterium that can cause a rare but dangerous infection called listeriosis.
Objectives: Studying the rate of salads contaminated with Listeria bacteria. and Listeria monocytogenes according to International, Arabic and Iraqi specifications and finding the correlation between commitments of restaurants to standard health conditions with contamination with these bacteria
Methods: The study included
... Show MoreBackground: Vibration decreases the viscosity of composite, making it flow and readily fit the walls of the cavity. This study is initiated to see how this improved adaptation of the composite resin to the cavity walls will affect microleakage using different curing modes
Materials and methods: Standard Class V cavities were prepared on the buccal surface of sixty extracted premolars. Teeth were randomly assigned into two groups (n=30) according to the composite condensation (vibration and conventional) technique, then subdivided into three subgroups (n=10) according to light curing modes (LED-Ramp, LED-Fast and Halogen Continuous modes). Cavities were etched and bonded with Single Bond Universal
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreImage compression is a suitable technique to reduce the storage space of an image, increase the area of storage in the device, and speed up the transmission process. In this paper, a new idea for image compression is proposed to improve the performance of the Absolute Moment Block Truncation Coding (AMBTC) method depending on Weber's law condition to distinguish uniform blocks (i.e., low and constant details blocks) from non-uniform blocks in original images. Then, all elements in the bitmap of each uniform block are represented by zero. After that, the lossless method, which is Run Length method, is used for compressing the bits more, which represent the bitmap of these uniform blocks. Via this simple idea, the result is improving
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More