A simple, sensitive, accurate and low cost effective spectrophotometric method has been developed for the determination of Tetracycline and Doxycycline in pure and pharmaceutical formulations. The method is based on the reaction of methyldopa with 4-aminoantipyren (4-AAP) in presence of potassium ferriecyanide (PFC) in an alkaline medium. Two optimization methods were applied to determine the optimum conditions of oxidizing coupling reaction variables; univariate and design of experiment (DOE) method. The conditions effecting the reaction; pH, buffer Volume, reagent concentration, oxidant concentration, type of buffer, order of addition, time of reaction and stability were optimized . Under univariate and design of experiment (DOE) method; the Tetracycline colored product having (λmax) at 531nm 535nm. Beer’s law was obeyed in concentration range of [two scale (1-18 µg.mL-1) and (15-70µg.mL-1)] with correlation coefficient of 0.9997 and 0.9942 respectively and for second method [two scale (1-30 µg.mL-1) and (40-100µg.mL-1)] with correlation coefficient of 1 and 0.9913. The assay limits of detection quantification were 0.1732, 0.3123µg.mL-1 respectively. Under univariate the Doxycycline colored product having (λmax) at 515nm. Beer’s law was obeyed in concentration range (10-90 µg.mL-1) with correlation coefficient of 0.9995. The assay limits of detection quantification were 1.0724µg.mL-1. The method was successfully applied to the analysis of the drug tablets formulation.
Polycystic ovary syndrome(PCOS) is a heterogeneous disorder of uncertain etiology , it is the most common endocrinopathy in women and most common cause of anovulatery infertility ,characterized by chronic anovulation and hyperandrogenemia .The present study was designed to investigate the effect of silymarin which is known to have antioxidant and insulin sensitivity effects on the levels of glucose, insulin ,testosterone ,leutinizing hormone(LH) and progesterone .Ovulation rate and Homeostasis Model Assessment of insulin Resistance (HOMA) ratio were determined .A 3-months of treatment were conducted in 60 PCOS patients in three well-matched groups .The first one (n=20),received silymarin(750mg/day) .The second group received
... Show MorePraise be to Allah. Praise be to Him. We seek refuge in Him. We seek forgiveness from him. We seek forgiveness from him.
And the disadvantages of our actions, of his hands
e
It is important, if not all, to pay tribute to God
Muhammad Abdo and Rasoulou, there is no way to deprive the nation of the weakness of God alone and not to share it
Which suffer from the Quran, and the loss of its borders, bad
The work did not work and did not improve
Do what they offer and delay the others, except by reference to this Koran and the extraction of treasures and secrets
And news.
The Great Quran Study
Lu Imito ordered each poisoned, and achieved several targets of
YEMYA: Knowing the secrets of the Grea
Abstract
Anaerobic digestion process of organic materials is biochemical decomposition process done by two types of digestion bacteria in the absence of oxygen resulting in the biogas production, which is produced as a waste product of digestion. The first type of bacteria is known as acidogenic which converts organic waste to fatty acids. The second type of bacteria is called methane creators or methanogenic which transforms the fatty acids to biogas (CH4 and CO2). The considerable amounts of biodegradable constitutes such as carbohydrates, lipids and proteins present in the microalgae biomass make it a suitable substrate for the anaerobic digestion or even c
... Show MoreWe study the physics of flow due to the interaction between a viscous dipole and boundaries that permit slip. This includes partial and free slip, and interactions near corners. The problem is investigated by using a two relaxation time lattice Boltzmann equation with moment-based boundary conditions. Navier-slip conditions, which involve gradients of the velocity, are formulated and applied locally. The implementation of free-slip conditions with the moment-based approach is discussed. Collision angles of 0°, 30°, and 45° are investigated. Stable simulations are shown for Reynolds numbers between 625 and 10 000 and various slip lengths. Vorticity generation on the wall is shown to be affected by slip length, angle of incidence,
... Show Moreفي هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More