A simple, rapid, accurate and sensitive spectrophotometric method is proposed for the detennination of chlorprQm<tZine -HCl in pwe form and in pharmaceutical formulation. This method is based on the formation. of ion assodation complexes of dmg with either thymol
blue or bromophenol blue in an acidic buffer at pH values 4.17 and
3.68, respectively.
The ion-pair complexes formed exhibit absorption maxima at 41 Onm for both thymol blue and bromophenol blue. These complexes· are quantitatively extracted &n
... Show MoreIn this work ,glass-metal apparatus was designed and manufactured which used for preparing ahigh purity uranium. The reaction is simply take place between iodine vapour and uranium metal at 500C in closed system to form uranium tetra iodide which is decomposed on hot wire at high temperature around 1100C. Also another apparatus was made from Glass and used for preparing ahigh purity of UI4 more than 99.9% purity.
The CdS quantum dots were prepared by chemical reaction
of cadmium oleylamine (Cd –oleylamine complex) with the
sulfite-oleylamine (S-oleylamine) with 1:6 mole ratios. The
optical properties structure and spectroscopy of the product
quantum dot were studied. The results show the dependence of the
optical properties on the crystal dimension and the formation of
the trap states in the energy band gap.
Carbon nanospheres (CNSs) were successfully prepared and synthesized by Catalytic Chemical Vapor Deposition (CCVD) by using camphor as carbon source only, over iron Cobalt (Fe-Co) saturated zeolite at temperature between (700 oC and 900 °C), with different concentrations of camphor, and reaction time. The synthesized CNSs were characterized using Scanning Electron Microscopy (SEM), X-ray diffraction spectroscopy (XRD), and Fourier Transform Infrared (FTIR). The carbon spheres in different sizes between 100 nm and 1000 nm were investigated. This work has done by two parts, first preparation of the metallic catalyst and second part formation CNSs by heat treatment.
Aim The aim of this study is to evaluate the effect of demographic, clinical, and radiographic factors on the duration of surgical extraction of impacted lower third molars. Materials and methods This retrospective study included patients who underwent surgical removal of impacted lower third molars, and the investigated factors were demographic data including age and gender, radiographic data including the impacted tooth angulation and depth of impaction and ramus relation, and clinical data including the state of eruption of the impacted teeth. These factors were evaluated for association with the duration of surgery. Descriptive statistical analysis included percentages and mean ± standard deviation (SD). Student's t-test was used to co
... Show MoreThis work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More