Entity

Time filter

Source Type

Rabat, Morocco

Alami R.,Research Laboratory and medical analysis of the Royal Gendarmerie | Jbilou M.,Research Laboratory and medical analysis of the Royal Gendarmerie | Cherrah Y.,Mohammed V University | Bouklouze A.,Mohammed V University | And 2 more authors.
Der Pharma Chemica | Year: 2016

An assay of phosmet residues in human blood by gas chromatography coupled to mass spectrometry (GC/MS) Clarus® 600/560 DMS PerkinElmer® was developed and validated in human blood samples loaded by residues of this insecticide. The extraction of phosmet has been carried out in solid phase through C18 SPE cartridges. The proposed method of phosmet residue analysis by GC/MS uses a capillary type Supelco®, the oven temperature was programmed from 75°C to 320°C. The Helium was used as carrier gas with a flow rate of 0.8 ml/min. The Phosalone was used as internal standard (IS). The retention time of the analyte and EI are 14.34 and 14.67 ± 0.02 min, respectively. The calibration curve is linear in the concentration range between 10 and 100ppb with R2 = 0.998. The method was validated according to ICH guidelines Q2 (R1) in terms of the criteria of accuracy, precision, linearity and specificity. The validated method is selective and has a quantification limit of 10 ppb. It can be used routinely for the determination of phosmet residues in real samples of human blood. Source


Elbenani B.,University Med dal | Ferland J.A.,University of Montreal
International Journal of Production Research | Year: 2012

The cell formation problem is extensively studied in the literature, but very few authors have proposed exact methods. In this paper a linear binary programming formulation is introduced to generate a solution for the cell formation problem. To verify the behaviour of the proposed model, a set of 35 benchmark problems is solved using the branch and cut method implemented in the IBM ILOG CPLEX 10.11 Optimiser. Moreover, these results allow us to validate the quality of the solution generated with heuristic methods proposed in the literature. This experimentation indicates that, for the smaller problems, the best-known solutions are the same as those generated with CPLEX 10.11 Optimiser. These results indicate a fair confidence in the optimality of the best-known solutions generated by the heuristic methods. Furthermore, our approach is the first exact method providing results of this quality. © 2012 Copyright Taylor and Francis Group, LLC. Source


Idchabani R.,University Med dal | Elganaoui M.,University of Lorraine | Garoum M.,University Med dal
Physical and Chemical News | Year: 2014

The building thermal behavior analysis constitutes the basis for improving energy efficiency. This work evaluates the thermal performance and the environmental impact of residential buildings’ heating in Morocco based on the climatic conditions of the Mediterranean coast. The present analysis applies the degree-days method taking into account the variability of the balance temperature of the building. The study concludes that the heating thermal requirements for the prototype building vary between 43 and 144KWh/m².year depending on its configuration. The heating needs increase with the glazing rate in the case of single glazing faster than in the double glazing. These needs also change proportionally to the rate of air exchange and decrease significantly with increasing casual heat gains. The liquefied petroleum gas (LPG) and electricity were chosen as sources of energy. The electricity consumption is 2.6 times greater than that of LPG in term of kg oil equivalent. Therefore, by using LPG the emissions of greenhouse gases can be divided by 3.4 compared to electricity. ©(2014), E-flow PDF Best Edition. All rights reserved. Source


Orhanou G.,University Med dal | Hajji S.E.,University Med dal
Journal of Theoretical and Applied Information Technology | Year: 2010

The Universal Mobile Telecommunications System (UMTS) offers panoply of 3G services that require a high protection of the transmitted information. In the present paper, we are interested by network access security, especially the protection of the data integrity and the provisioning of data encryption. A special interest will be given to the second set of 3GPP cryptographic algorithms UEA2/UIA2 based on the SNOW 3G algorithm. This set was, in fact, a subject only of few research works in comparison with the first one based on KASUMI algorithm. A closer look is taken at both the encryption algorithm UEA2 and the integrity algorithm UIA2 operations. The different operation modes of the algorithm SNOW 3G will be presented as well. A study of the time and space complexity of three algorithms has been carried out. © 2005 - 2010 JATIT. All rights reserved. Source


Labjar N.,University Med dal | Labjar N.,CNRS Materials and Transformations Unit of UMET | Hajjaji S.E.,University Med dal | Lebrini M.,University of Lille Nord de France | And 5 more authors.
Journal of Materials and Environmental Science | Year: 2011

In this work, the surface morphology and chemical analysis of carbon steel substrates after weight loss measurements in 1 M HCl media in the absence and the presence of aminotris-(methylenephosphonic) acid (ATMP) were studied using a scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS). X-ray photoelectron spectroscopy was coupled to these characterizations to qualify corrosion layers and morphologies. The solution of immersion was analyzed by inductively coupled plasma. Results indicate that the addition of ATMP reduces the rate of metal attack. EDX, SEM and X-ray photoelectron spectroscopy observations of the electrode surface confirmed existence of a protective adsorbed film of the inhibitor on the electrode surface. Source

Discover hidden collaborations