A new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .
This research was designed to study the effect of water and alcoholic crude extracts of Calvatia craniiformis in vitro and in vivo On the other hand this study tested the toxic effect of both extracts in normal laboratory mice. The results showed that water and alcoholic extracts relatively have an acute toxic effect in mice in respect to LD50 (85 mg/kg, and 177mg/kg respectively). However the chronic toxicity of water extract at three different concentration (50, 75, 100 mg/kg) and alcoholic extract at concentrations of (100, 150, 200 mg/kg) was investigated in normal mice by (I.P) administration for 30 days alternatively and one drag in 48 hours . The results indicated significant effect (P ? 0.01) increasing in (MI) and (BI) of bone mar
... Show MoreThe present study aimed to investigate the effects of alcohol and hot aqueous extracts for leaves of Adhatoda vasica on, first larval instars Musca domestica. They were exposed to the suggested concentrations of alcoholic extract which were (500, 1000, 1500, 2000) PPM while the suggested concentrations of the hot aqueous extracts (500, 1000, 1500, 2000, 2500)PPM. The alcoholic (Methanol) extract of leaves was much effective on to killing the first larval instars of the M. domestica than hot aqueous extract.
The development of a reversed phase high performance liquid chromatography fluorescence method for the determination of the mycotoxins fumonisin B1 and fumonisin B2 by using silica-based monolithic column is described. The samples were first extracted using acetonitrile:water (50:50, v/v) and purified by using a C18 solid phase extraction-based clean-up column. Then, pre-column derivatization for the analyte using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol was carried out. The developed method involved optimization of mobile phase composition using methanol and phosphate buffer, injection volume, temperature and flow rate. The liquid chromatographic separation was performed using a reversed phase Chromolith® RP-18e column
... Show MoreNew membrane electrodes for determination of ciprofloxacin hydrochloride were prepared depending on ciprofloxacin hydrochloride - phosphotungstic acid (CFH-PT) as an active material and these electrodes were made with three plasticizers: Di-octylphenylphosphonate(DOPH), Di-butyl phosphate (DBP)Tri-n-butyl phosphate(TBP), in PVC matrix. One of the ciprofloxacin electrodes was gave Nernstian slope equal to 57.21 mV/ decade for DOPH membrane with concentration range from 1.5×10-5 to1.0×10-1 M, and detection limit equal to 1.5×10-6 M .Lifetime was 93 days. Non- Nernstian responses equal to 39.40 and 30.70 mV/ decade for membranes DBP, TBP, respectively. These electrodes were gave concentration range from 1.0× 10-5 to 1.0×10-2 and from 4.0
... Show MoreThe article aims to consider the concept of language metaphor in Russian and Arabic languages and the problem of metaphor functioning in language, since it is one of the most important figurative components of the structural organization of the text and an important means of reflecting the national culture of each people. and often in revealing the image of a metaphor one can feel the full flexibility of the language and its beauty.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe aim of this paper is to propose a reliable iterative method for resolving many types of Volterra - Fredholm Integro - Differential Equations of the second kind with initial conditions. The series solutions of the problems under consideration are obtained by means of the iterative method. Four various problems are resolved with high accuracy to make evident the enforcement of the iterative method on such type of integro differential equations. Results were compared with the exact solution which exhibits that this technique was compatible with the right solutions, simple, effective and easy for solving such problems. To evaluate the results in an iterative process the MATLAB is used as a math program for the calculations.