The determination of captopril (CAP) using a new continuous flow injection analysis (CFIA) method was given in this work CAP in its pure state and some of its pharmaceutical preparations. The technique can be described as simple, fast, sensitive, easy to operate, and low-cost. The CAP reacted with ammonium ceric(IV) sulfate (ACS)2(NH4 )2SO4Ce(SO4)2. 3 H2O in an acidic medium and the reaction led to the formation of a white, slightly yellowish precipitate. The formed precipitate was studied using Ayah 6S×1-ST-2D Solar cell-CFI Analyzer, a through the reflection of accident light on the surfaces of the precipitate particles at (0-1800), expressed as the response of the transducer measured in (mV). Some chemical and physical parameters were studied to provide the optimal conditions for the study. The calibration curve within the range of (0.07-3.0) mmol/L was linear, with a correlation coefficient (r) value equal to (0.9983), and the percentage value of linearity (R2%) was (99.65). The method's detection limit (L.O.D.) of the new method was 272.5 ng/25 µL; it was calculated by diluting the minimum concentration in the calibration curve gradually. RSD% was less than 0.2% for 0.9, 1.5, and 3.0 mmol/L concentrations of C.A.P. for n=8. The method was successfully applied to estimate C.A.P. in three pharmaceutical preparations, each produced by a different company. The new method was compared with the UV-Spectrophotometric method (classical method) at λmax= 207.2 nm by using the method of standard additions. Both the t-test and the F-test were conducted to ensure that there wasn't a significant difference between the new method and the conventional one. The results of both tests showed, at a confidence level of 95%, that there was no significant difference.
IA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreCase Report.
To present a case of a previous complicated mandibular orthognathic surgery that aimed to setback the mandible in a female cleft lip and palate (CLP) patient, which led to bone necrosis on one side with subsequent severe mandibular deviation and facial asymmetry. We additionally reviewed the previous reports of similar complications, the pathophysiology and the factors that could lead to this dreadful result.
A 27-year-old female patient presented with a severe dentofacial deformity secondary to a complicated bilateral sagittal spli
A computational investigation is carried out in the field of charged –particle optics with the aid of numerical analysis method using the personal computer. The work is concerned with the design of electron gun with space-charge effect. The Finite element method (FEM) used in the solution of Poison's equation for determine the axial potential distribution of the two-electrode immersion lens operated under zero magnification condition , and from the solution of the paraxial ray equation the optical properties such as the focal length , spherical and chromatic aberration coefficients are determined, also a calculation of the brightness and perveance for the lens. The electrodes geometry was determined in two and three dimensi
... Show MoreABSTRACT
The research aims to know the reality of a two examined variables at the organization studied identifying the relationship between managerial processes reengineering and organizational citizenship behavior. The research applied on the Electronic Manufacturing Company encompassing a sample of managers and employees consisted of (100) individuals. A questionnaire is the main instrument for data gathering, which has been included (45) questions as well as personal interviews to support the questionnaire's questions and to achieve greater realism for collecting information.
Answers were analyzed to reach the final results through the use of a number of statistical methods via
... Show More