For aspirin estimated, a molecularly imprinted polymer MIP-ASP electrodes were generated by electro-polymerization process, the electrodes were prepared by combining the template (aspirin) with (vinyl acetate (VA), 1-vinylimidizole (VIZ) as a functional monomer and N, N-methylene bisacrylamide (MBAA) as crosslinkers using benzoyl peroxide (BPO) as an initiator. The efficiency of the membrane electrodes was analyzed by differential pulse voltammetry (DPV). Four electrodes were synthesized using two different plasticizers, di-butyl sebacate (DBS), di-octyl phthalate (DOP) in PVC matrix. Scanning electron microscopy (SEM) was used to describe the generated MIP, studying the electrodes properties, the slope, detection limit, and life time and linearity range. The effect of PH and interferes on the efficiency of the MIP electrode was investigated. The study has shown that the molecularly imprinted electrodes have high sensitivity and responsiveness to aspirin. The DPV value was linearly dependence on the aspirin concentration and a linear curve was obtained within the range of (1×10−1-5×10-4) M of aspirin with correlation coefficients are about (0.9974, 0.9966, 0.9938 and 0.9961) with slops value of (-21.41, -17.67, -17.47 and -18.67) and the detection limit for all electrodes ranging from (7.5×10-5-1×10-4) M. The molecularly imprinted electrode exhibited a good response with highly reproducible and no effect on interferes frequently available in pharmaceutical formulations. The approach employed is easy and fast. Also ASP membranes get a limited time of response, excellent mechanical stability, removable and are easy to construct.
This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV
... Show MoreSince the time it emerged, stylistics, as a field of knowledge which combines both linguistics and literature, acquired a special status in the linguistic arena. Its significance in complementing the meaning delivered by linguistic means has been proven and acknowledged through numerous stylistic analytic attempts of different literary works and in different languages. The question put forward in this paper is whether or not the stylistic analysis can work as effectively on translated texts as it does on the original ones without having the results reached by the analysis distorting the meaning of the original text. An attempt to investigate this question is made herein by conducting a lexical stylistic analysi
... Show MoreChalcopyrite thin films were one-step potentiostatically deposited onto stainless steel plates from aqueous solution containing CuSO4, In2(SO4)3 and Na2S2O3.The ratio of (In3+:Cu2+) which involved in the solution and The effect of cathodic potentials on the structural had been studied. X-ray diffraction (XRD) patterns for deposited films showed that the suitable ratio of (In3+:Cu2+) =6:1, and suitable voltage is -0.90 V versus (Ag/AgCl) reference electrode
This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame
... Show MoreThis study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Bra
The propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More