One of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a
... Show MoreComplexes reaction of Fe+2, Cd+2, Hg+2 and Ag+ with the 2-thiotolylurea were prepared in ethanolic medium with the (1:1) M:L ratio yielded a series of neutral complexes. The prepared complexes were characterized using flame atomic absorption, micoelemental analysis (C.H.N), chloride content (Mohr Method) , FT.IR and UV-Vis spectroscopic, as well as magnetic susceptibility and conductivity measurement. From the above data, the proposed molecular structure for Fe+2, Cd+2 and Hg+2 complexes are tetrahedral geometry while Ag+ complex is trigonal structure.
Background: Prophylaxis methods are used to mechanically remove plaque and stain from tooth surfaces; such methods give rise to loss of superficial structure and roughen the surface of composites as a result of their abrasive action. This study was done to assess the effect of three polishing systems on surface texture of new anterior composites after storage in artificial saliva. Materials and methods: A total of 40 Giomer and Tetric®N-Ceram composite discs of 12 mm internal diameter and 3mm height were prepared using a specially designed cylindrical mold and were stored in artificial saliva for one month and then samples were divided into four groups according to surface treatment: Group A (control group):10 specimens received no surfa
... Show MoreThis approach was developed to achieve an accurate, fast, economic and sensitivity to estimation of diphenhydramine Hydrochloride. The dye that produced via reaction between diphenhydramine HCl with thymol blue in acidic medium pH ≈ 4.0. The ion pair method include an optimization study to formed yellowcolored that extraction by liquid – liquid method. The product separated of complexes by using by chloroform solution measured spectrophotometry at 400 nm. The analysis data at optimum conditions showed that linearity concentration in a range of calibration curve 1.0 – 50 μg /mL, limit of detectionand limit of quantification 0.0786 and 0.2358 μg/mL respectively. The molar absorptivity and Sandell’s sensitivity were 1.8 × 10 -4 L/mo
... Show MoreA rapid, sensitive and without extraction spectrophotometric method for determination of clonazepam (CLO) in pure and pharmaceutical dosage forms has been described. The proposed method was simply depended on charge transfer reaction between reduced CLO (n-donor) and metol (N-methyl-p-aminophenol sulfate) as a chromogenic reagent (π- acceptor). The reduced drug, with zinc and concentrated hydrochloric acid, produced a purple colored soluble charge-transfer complex with metol in the presence of sodium metaperiodate in neutral medium, which has been measured at λmax 532 nm. All the variables which affected the developed and the stability of the colored product such as concentration of reagent and oxidant, temperature and time of rea
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More
