A new, Simple, sensitive and accurate spectrophotometric methods have been developed for the determination of sulfanilamide (SNA) drug in pure and in synthetic sample. This method based on the reaction of sulfanilamide (SNA) with 1,2-napthoquinone-4-sulphonic acid (NQS) to form N-alkylamono naphthoquinone by replacement of the sulphonate group of the naphthoquinone sulphonic acid by an amino group. The colored chromogen shows absorption maximum at 455 nm. The optimum conditions of condensation reaction forms were investigated by: (1) univariable method, by optimizing the effect of experimental variables; (different bases, reagent concentration, borax concentration and reaction time), (2) central composite design (CCD) including the effect of three experimental factors (reagent concentration, borax concentration, and reaction time). The linearity ranges of sulfanilamide are (5-30 µg.mL -1 ) at 455 nm with molar absorptivity (6.9568×10 4 - 7.0774×10 4 L.mol -1 .cm -1 ), Sandell's sensitivity index (2.4753 - 2.4330 μg.cm -2 ) and detection limit of (0.546 – 0.536 µg.mL -1 ) for each procedure respectively. The results showed there are no interferences of excipients on the determination of the drug. The proposed method has been successfully applied for the determination of sulfanilamide in pure and in synthetic sample. Keywords: Spectrophotometric determination, Sulfanilamide, Central composite design, 1, 2-napthoquinone-4-sulphonic acid (NQS).
Simultaneous determination of Furosemide, Carbamazepine, Diazepam, and Carvedilol in bulk and pharmaceutical formulation using the partial least squares regression (PLS-1 and PLS-2) is described in this study. The two methods were successfully applied to estimate the four drugs in their quaternary mixture using UV spectral data of 84synthetic mixtures in the range of 200-350nm with the intervals Δλ=0.5nm. The linear concentration range were 1-20 μg.mL-1 for all, with correlation coefficient (R2) and root mean squares error for the calibration (RMSE) for FURO, CARB, DIAZ, and CARV were 0.9996, 0.9998, 0.9997, 0.9997, and 0.1128, 0.1292, 0.1868,0.1562 respectively for PLS-1, and for PLS-2 were 0.9995, 0.9999, 0.9997, 0.9998, and 0.1127, 0.
... Show MoreA simple, precise, rapid, and accurate reversed – phase high performance liquid chromatographic method has been developed for the determination of guaifenesin in pure from pharmaceutical formulations.andindustrial effluent. Chromatography was carried out on supelco L7 reversed- phase column (25cm × 4.6mm), 5 microns, using a mixture of methanol –acetonitrile-water: (80: 10 :10 v/v/v) as a mobile phase at a flow rate of 1.0 ml.min-1. Detection was performed at 254nm at ambient temperature. The retention time for guaifenesin was found 2.4 minutes. The calibration curve was linear (r= 0.9998) over a concentration range from 0.08 to 0.8mg/ml. Limit of detection (LOD) and limit of quantification ( LOQ) were found 6µg/ml and 18µg/ml res
... Show MoreA batch and flow injection (FI) spectrophotometric methods are described for the determination of barbituric acid in aqueous and urine samples. The method is based on the oxidative coupling reaction of barbituric acid with 4-aminoantipyrine and potassium iodate to form purple water soluble stable product at λ 510 nm. Good linearity for both methods was obtained ranging from 2 to 60 μg mL−1, 5–100 μg mL−1 for batch and FI techniques, respectively. The limit of detection (signal/noise = 3) of 0.45 μg mL−1 for batch method and 0.48 μg mL−1 for FI analysis was obtained. The proposed methods were applied successfully for the determination of barbituric acid in tap water, river water, and urine samples with good recoveries of 99.92
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreA spectrophotometric determination of azithromycin was optimized using the simplex model. The approach has been proven to be accurate and sensitive. The analyte has been reacted with bromothymol blue (BTB) to form a colored ion pair which has been extracted in chloroform in a buffer medium of pH=4 of potassium phthalate. The extracted colored product was assayed at 415 nm and exhibited a linear quantification range over (1 - 20) g/ml. The excipients did not exhibit any interferences with the proposed approach for assaying azithromycin in pharmaceutical formulations.