In this work, a simple and very sensitive cloud point extraction (CPE) process was developed for the determination of trace amount of metoclopramide hydrochloride (MTH) in pharmaceutical dosage forms. The method is based on the extraction of the azo-dye results from the coupling reaction of diazotized MTH with p-coumaric acid (p-CA) using nonionic surfactant (Triton X114). The extracted azo-dye in the surfactant rich phase was dissolved in ethanol and detected spectrophotometrically at λmax 480 nm. The reaction was studied using both batch and CPE methods (with and without extraction) and a simple comparison between the two methods was performed. The conditions that may be affected by the extraction process and the sensitivity of m
... Show MoreAn experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the r
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreElectro-chemical Machining is significant process to remove metal with using anodic dissolution. Electro-chemical machining use to removed metal workpiece from (7025) aluminum alloy using Potassium chloride (KCl) solution .The tool used was made from copper. In this present the optimize processes input parameter use are( current, gap and electrolyte concentration) and surface roughness (Ra) as output .The experiments on electro-chemical machining with use current (30, 50, 70)A, gap (1.00, 1.25, 1.50) mm and electrolyte concentration (100, 200, 300) (g/L). The method (ANOVA) was used to limited the large influence factors affected on surface roughness and found the current was the large influence f
... Show MoreIn this study, pure Co3O4 nano structure and doping with 4 %, and
6 % of Yttrium is successfully synthesized by hydrothermal method.
The XRD examination, optical, electrical and photo sensing
properties have been studied for pure and doped Co3O4 thin films.
The X-ray diffraction (XRD) analysis shows that all films are
polycrystalline in nature, having cubic structure.
The optical properties indication that the optical energy gap follows
allowed direct electronic transition calculated using Tauc equation
and it increases for doped Co3O4. The photo sensing properties of
thin films are studied as a function of time at different wavelengths to
find the sensitivity for these lights.
High photo sensitivity dope
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreIn this paper, a procedure to establish the different performance measures in terms of crisp value is proposed for two classes of arrivals and multiple channel queueing models, where both arrival and service rate are fuzzy numbers. The main idea is to convert the arrival rates and service rates under fuzzy queues into crisp queues by using graded mean integration approach, which can be represented as median rule number. Hence, we apply the crisp values obtained to establish the performance measure of conventional multiple queueing models. This procedure has shown its effectiveness when incorporated with many types of membership functions in solving queuing problems. Two numerical illustrations are presented to determine the validity of the
... Show More