The extraction of pesticides is a critical and urgent issue in the preparation for and determination of pesticide residues. The lack of a quick, easy, and successful extraction process is the most critical and challenging problem, even if diagnostic tools have improved and pesticide residues have been better understood. This study contrasted the QuEChERS method, which uses gas chromatography with a flame ionization detector, with the LLE method, which uses liquid-liquid extraction, in order to extract pyridaben from cucumbers and spiromesifen from tomatoes. The GC-FID device was employed to ascertain the spiromesifen LOD and LOQ, which were 0.002 μg mL-1 and 0.00
Background: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a
... Show MoreDevelopment of a precise and delicate reaction has been acquired for the determination of vancomycin hydrochloride using batch and cloud point extraction (CPE) methods. The first method is based on the formation of azo dye as a result of diazotized dapsone coupled with vancomycin HCl (VAN) in a basic medium. The sensitivity of this reaction was enhanced by utilizing a nonionic surfactant (Triton X-114) and the cloud point extraction technique (second method). The azo dye formed was extracted into the surfactant-rich phase, dissolved in ethanol and detected at λmax 440 nm spectrophotometrically. The reaction was investigated using both batch and CPE methods (with and without extraction), and a simple comparison between the two
... Show Moreبسبب محدودية الموارد الطبيعية، فأن سكان الخليج ومنذ القدم وجهوا جلّ نشاطاتهم توجهاً بحرياً: صيد الاسماك وصناعة اللؤلؤ العنصر الرئيس في حجم التشغيل، وتكوين الفائض الاقتصادي في المنطقة آنذاك.
لقد تزايدت أهمية هذا النشاط بخاصة بعد النصف الثاني من القرن التاسع عشر، لرواج تجارة اللؤلؤ عالمياً، وأنفتاح الخليج على الدول الاوروبية التي شهدت نهضة صناعية متسارعة، وحيث وصلت الخليج العديد من بضائع
... Show MoreCancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co
... Show MoreIn this paper, a single link flexible joint robot is used to evaluate a tracking trajectory control and vibration reduction by a super-twisting integral sliding mode (ST-ISMC). Normally, the system with joint flexibility has inevitably some uncertainties and external disturbances. In conventional sliding mode control, the robustness property is not guaranteed during the reaching phase. This disadvantage is addressed by applying ISMC that eliminates a reaching phase to ensure the robustness from the beginning of a process. To design this controller, the linear quadratic regulator (LQR) controller is first designed as the nominal control to decide a desired performance for both tracking and vibration responses. Subsequently, discontinuous con
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More