Ocular drug delivery is challenging due to the presence of anatomical and physiological barriers. These barriers can affect drug entry into the eye following multiple routes of administration (e.g., topical, systemic, and injectable). Topical administration in the form of eye drops is preferred for treating anterior segment diseases, as it is convenient and provides local delivery of drugs. Major concerns with topical delivery include poor drug absorption and low bioavailability. To improve the bioavailability of topically administered drugs, novel drug delivery systems are being investigated. Nanocarrier delivery systems demonstrate enhanced drug permeation and prolonged drug release. This review provides an overview of ocular barr
... Show MoreThe aim of the present study is to investigate and compare the efficacy of L-carnitine, multivitamins and their combination therapies on semen characteristics in idiopathic male infertility. Idiophathic infertile patients were randomly divided into three groups who had received three different treatment regimens for three months: group A (45 patients) has received 2 grams daily of L-carnitine alone; group B (55 patients) had received the combination of L-carnitine (2 grams daily) plus one tablet daily of multivitamins (Stresstabs®); and group C (29 patients) had received one tablet daily of multivitamins alone. The study was started on 1/11/2009 and completed on 31/3/2010 and performed at Rizgari Teaching Hospital in
... Show MoreKE Sharquie, JR Al-Rawi, AA Noaimi, HM Al-Hassany, Journal of drugs in dermatology: JDD, 2012 - Cited by 47
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support
... Show MoreMultilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More