The development of a reversed phase high performance liquid chromatography fluorescence method for the determination of the mycotoxins fumonisin B1 and fumonisin B2 by using silica-based monolithic column is described. The samples were first extracted using acetonitrile:water (50:50, v/v) and purified by using a C18 solid phase extraction-based clean-up column. Then, pre-column derivatization for the analyte using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol was carried out. The developed method involved optimization of mobile phase composition using methanol and phosphate buffer, injection volume, temperature and flow rate. The liquid chromatographic separation was performed using a reversed phase Chromolith® RP-18e column (100 mm × 4.6 mm) at 30 °C and eluted with a mobile phase of a mixture of methanol and phosphate buffer pH 3.35 (78:22, v/v) at a flow rate of 1.0 mL min−1. The fumonisins separation was achieved in about 4 min, compared to approximately 20 min by using a C18 particle-packed column. The fluorescence excitation and emission were at 335 nm and 440 nm, respectively. The limits of detections were 0.01–0.04 μg g−1 fumonisin B1 and fumonisin B2, respectively. Good recoveries were found for spiked samples (0.1, 0.5, 1.5 μg g−1 fumonisins B1 and B2), ranging from 84.0 to 106.0% for fumonisin B1 and from 81.0 to 103.0% for fumonisin B2. Fifty-three samples were analyzed including 39 food and feeds and 14 inoculated corn and rice. Results show that 12.8% of the food and feed samples were contaminated with fumonisin B1 (range, 0.01–0.51 μg g−1) and fumonisin B2 (0.05 μg g−1). The total fumonisins in these samples however, do not exceed the legal limits established by the European Union of 0.8 μg g−1. Of the 14 inoculated samples, 57.1% contained fumonisin B1 (0.16–41.0 μg g−1) and fumonisin B2 (range, 0.22–50.0 μg g−1). Positive confirmation of selected samples was carried out using liquid chromatography–tandem mass spectrometry, using triple quadrupole analyzer and operated in the multiple reaction monitoring mode.
In this paper we have dealt with the word " בַּיִת" in the Book of Joshua because it makes one of those that highly employed the word בַּיִת" " in the Old Testament. The Book of Joshua comes sixth in the order of tanakh wich was written by Joshua son of Noon in Palestine during the fifteenth century B.C. and it covers a three-decade era extending from the death of Moses til the death of Joshua son of Noon.
The word " בַּיִת " in this paper refers to the place, where expressions are made by a noun modified by a noun . The modifier is"" בַּיִת , and the modified is another noun. Herein, we
... Show MoreThis paper aims at discovering the real implication of deduction in the Arabic culture
with concentration on its applications in Arabic grammar, logic, and fundamentals of Islamic
legislations. Some light has been shed on deduction in the Arabic culture but most of recent
works did not analyze deduction according to the pragmatic analysis. This paper will answer
the following questions:
to what extent deduction in Arabic grammar could comprehend with deduction l logic and
fundamentals of thinking in Islamic thought?
how can we find the deduction thinking in the Qur’anic surah if Ghafir?
Can we find parts of deduction in the surah?
The methodology in this paper is descriptive analytical. This metho
In this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve
... Show MoreAsthma is a chronic inflammatory disease of airways mediated by T-helper 2 (Th2) cells involving complex signaling pathways. Although resveratrol has previously been shown to attenuate allergic asthma, the role of miRNA in this process has not been studied. We investigated the effect of resveratrol on ovalbumin-induced experimental allergic asthma in mice. To that end, BALB/c mice were immunized with ovalbumin (OVA) intraperitoneally followed by oral gavage of vehicle (OVA-veh) or resveratrol (100 mg/kg body) (OVA-res). On day 7, the experimental groups received intranasal challenge of OVA followed by 7 days of additional oral gavage of vehicle or resveratrol. At day 15, all mice were euthanized and bronchioalveolar fluid (BALF), se
... Show MoreObstruct:  
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More