Continuous flow injection analysis (CFIA) is one of the simplest, easiest, and multilateral analytical automation methods in moist chemical analysis. This method depends on changing the physical and chemical properties of a part of the specimen spread out from the specimen injected into the carrier stream. The CFIA technique uses automatic analysis of samples with high efficiency. The CFIA PC compatibility also allows specimens to be treated automatically, reagents to be added, and reaction conditions to be closely monitored. The CFIA is one of the automated chemical analysis methods in which a successive specimen sample is to be estimated and injected into a vector stream from a flowing solution that meets the reagent and mixes at a specific point, the y-junction, before reaching the detector. However, CFIA does not have a separation method because the sample, carrier stream, and reagent all enter the system simultaneously and move together at a specific flow rate to the end of the system. It is also possible to inject a second specimen sample to be estimated before the first sample reaches the detector. For all the reasons mentioned, the CFIA technique analysis is appropriate, fast, and ideal for analyzing different samples. This general technique deals with solutions and is used for various tasks, including pH measurement, conductivity, colorimetry, titration, and enzyme assays. So, it was used in analytical chemistry to estimate many samples, including medicines, because they are essential substances for human life, and everyone widely uses them.
This paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.
Abstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreIn this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas
... Show MoreLabrotary experiment was conducted to study the effect of different levels of nematode population densities of Meloidogyne spp on seed germination percentage and seedling characteristics of Vigna sinensis, Ahelmoschus esculentus, Cicer arietinum, Helianthus annuus and Rap-hanus sativus. Four different levels of nematode populat-ion densities ranged from 1 to 4 prepared from radish in-fected roots and used as inoculating agent to infect all seed types in the experiment Seed germination percentage of Vigna sinensis and Ablemoschus eseulentus were highly reduced (at 0.01 level of significance) with increased nematode population level from 1 to 4. Seedling length of the remaining seed types were significantly reduced (at 0.01 level of signif
... Show MoreFour local hemolysin producer bacterial isolates were selected, tow of them gram negative bacteria (Escherichia coli ,Pseudomonas aeruginosa ) and the other two were gram positive bacteria (Staphylococcus aureus , Bacillus cereus ). Minimum inhibitory concentration of the aqueous and alcoholic extracts of Punica granatum L. pericarp were determined towards the four bacterial isolates ,results obtaind showed that MICs of the aqueous extract were 200 mg/ml for E .coli and P. aeruginosa isolates while were 5 mg/ml and 2 mg/ml for B. cereus, S. aureus , respectively The MICs for the ethanolic extract were 50 mg/ml , 20 mg/ml ,1 mg/ml ,0.5 mg/ml for E. coli ,P. aeruginosa ,B. cereus ,S. aureus , respectively. The effect of Sub-MICs o
... Show MoreA geological model was built for the Sadi reservoir, located at the Halfaya oil field. It is regarded as one of the most significant oilfields in Iraq. The study includes several steps, the most essential of which was importing well logs from six oil wells to the Interactive Petrophysics software for conducting interpretation and analysis to calculate the petrophysical properties such as permeability, porosity, shale volume, water saturation, and NTG and then importing maps and the well tops to the Petrel software to build the 3D-Geological model and to calculate the value of the original oil in place. Three geological surfaces were produced for all Sadi units based on well-top data and the top Sadi structural map. The reservoir has
... Show MoreIn this paper, the problem of developing turbulent flow in rectangular duct is investigated by obtaining numerical results of the velocity profiles in duct by using large eddy simulation model in two dimensions with different Reynolds numbers, filter equations and mesh sizes. Reynolds numbers range from (11,000) to (110,000) for velocities (1 m/sec) to (50 m/sec) with (56×56), (76×76) and (96×96) mesh sizes with different filter equations. The numerical results of the large eddy simulation model are compared with k-ε model and analytic velocity distribution and validated with experimental data of other researcher. The large eddy simulation model has a good agreement with experimental data for high Reynolds number with the first, seco
... Show MoreBackground: Injuries to blood vessels are among the most dramatic challenges facing trauma surgeons because repair is often urgent, the surgeon has to decide between management options (open or endovascular), and gaining control and reconstructing a major arterial injury can be technically demanding .
Objective:,To analyze the cause of injury, surgical approach, outcome and complications of axillary artery injuries.
Methods A descriptive cross-sectional study on fifty patients at Ibn-Alnafees hospital in Baghdad from January 2005 to December 2010
Results Males were more commonly affected than female with ratio of 6.1:1. Most injuries were caused by bullet and shell (84%), followed by stab wounds (10%) and blunt trauma (6%). Pati
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show More