Four molecular imprinted polymer (MIP) membranes for Mebeverine.HCl (MBV.HCl) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of 2-acrylamido-2-methyl-1-propane sulphonic acid (AMPS) as monomer, pentaerythritoltriacrylate (PETRA) as a cross linker ,benzoyl peroxide (BPO) as an initiator and mebeverine as a template. Four different types of plasticizers of different viscosities were used and the electrodes were fully characterized in terms of plasticizer type, response time, lifetime, pH and detection limit.
The MBV-MIP electrodes exhibited Nernstian response in concentration range from 1.0×10-6 to1.0×10-1 M with slopes of 13.98, 19.60, -20.43 and 19.01 mV/ decade. The detection limit and quantification are found to be 4×10-6, 3× 10-6, 2× 10-5and 1.2× 10-6 M ,respectively. Interference study for inorganic cations and amino acids was also studied. The best electrode based tris (2-ethyl hexyl) phosphate plasticizer was applied successfully for potentiometric determination of mebeverine in commercial tablets. Excellent average recovery obtained by potentiometric methods was about 102.26% which is in good agreements with British Pharmacopoeia.
Electrical Discharge Machining (EDM) is a non-traditional cutting technique for metals removing which is relied upon the basic fact that negligible tool force is produced during the machining process. Also, electrical discharge machining is used in manufacturing very hard materials that are electrically conductive. Regarding the electrical discharge machining procedure, the most significant factor of the cutting parameter is the surface roughness (Ra). Conventional try and error method is time consuming as well as high cost. The purpose of the present research is to develop a mathematical model using response graph modeling (RGM). The impact of various parameters such as (current, pulsation on time and pulsation off time) are studied on
... Show MoreE-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and
... Show MoreMetal oxide nanoparticles, including iron oxide, are highly considered as one of the most important species of nanomaterials in a varied range of applications due to their optical, magnetic, and electrical properties. Iron oxides are common compounds, extensive in nature, and easily synthesized in the laboratory. In this paper, iron oxide nanoparticles were prepared by co-precipitation of (Fe+2) and (Fe+3) ions, using iron (II and III) sulfate as precursor material and NH4OH solution as solvent at 90°C. After the synthesis of iron oxide particles, it was characterized using X-ray diffraction (XRD), infrared spectroscopy (FTIR), and scanning electron microscopy (SEM). These tests confirmed the obtaining o
... Show MoreFurfural is one of the one of pollutants in refinery industrial wastewaters. In this study advanced oxidation process using UV/H2O2 was investigated for furfural degradation in synthetic wastewater. The results from the experimental work showed that the degradation of furfural decreases as its concentration increases, reaching 100% at 50mg/l furfural concentration and increasing the concentration of H2O2 from 250 to 500 mg/l increased furfural removal from 40 to 60%.The degradation of furfural reached 100% after 90 min exposure time using two UV lamps, where it reached 60% using one lamp after 240 min exposure time. The rate of furfural degradation k increased at the pH and initial concentratio
... Show MoreSteganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re
... Show MorePerchloroethylene (PERC) is commonly used as a dry-cleaning solvent, it is attributed to many deleterious effects in the biological system. The study aimed to investigate the harmful effect associated with PERC exposure among dry-cleaning workers. The study was carried out on 58 adults in two groups. PERC-exposed group; include thirty-two male dry-cleaning workers using PERC as a dry-cleaning solvent and twenty-six healthy non-exposed subjects. History of PERC exposure, use of personal protection equipment (PPE), safety measurement of the exposed group was recorded. Blood sample was taken from each participant for measurement of hematological markers, liver and kidney function tests. The results showed that 28.1% of the workers were usin
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show More