Lafutidine (LAF) a newly developed histamine H2-receptor antagonist with absorption window makes it a good candidate to be prepared as floating drug delivery system. The current study involves formulation and in- Vitro evaluation of lafutidine as floating microspheres. Different formulation variables that affect the physicochemical properties of the prepared microspheres besides to the drug release behavior were investigated. Fourteen formulas were prepared by emulsion (o/w) solvent evaporation method using Ethyl cellulose (EC) as the polymeric matrix and tween 80 (TW80) as an emulsifying agent. The prepared formulas were evaluated for their percentage buoyancy (%), Percentage yield (%) and Entrapment efficiency (EE %). The results obtained by formulations were in the range of 64.5±1.885% to 96.8±1.22%, 70.4% to 86, 8% and 27±1.39% to 91.2±1.21% respectively. Formulas (FLF10 and FLF10A ) which prepared using 3:1 of EC : lafutidine ratio but with different stirring speed show desirable physicochemical properties and optimum, prolonged in vitro drug release profile and about 92.62% and 95.31% of drug dose release within 14 hrs respectively. It can be concluded that the floating microspheres of lafutidine can be made by emulsion solvent evaporation technique with good gastro retention ability and with expected better drug bioavailability
New isatinic hydrazone Schiff-base ligands, namely furan-2-carboxylic acid (2-oxo-1,2-dihydro-indol- 3-ylidene)-hydrazide (L1), thiophene-2-carboxylic acid (2- oxo-1,2-dihydro-indol-3-ylidene)-hydrazide (L2) and 2-(pyridine-2-yl-hydrazono)-1,2-dihydro-indol-3-one) (L3) are reported. The ligands were prepared by the condensation of furan-2-carboxylic acid hydrazide (L1), thiophene- 2-carboxylic acid hydrazide (L2), and 2-hydrazino pyridine (L3) with isatine. Monomeric complexes were prepared from the reaction of the corresponding metal chloride with the ligands. The ligands and their nine new complexes of the general formulae [M(Ln)2]Cl2 [where M = Co(II), Zn(II) and Cd(II); n = L1, L2 and L3] were characterised by spectroscopic methods (FTI
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures
... Show MoreHypertension is one of the main causes of heart disease; beta- blockers play a crucial role in the management of patients with essential hypertension. Bisoprolol is one of the widely used drugs for the treatment of hypertension. Bisoprolol tablets were prepared by two methods (direct and wet) using different proportion and types of diluents, different binder types and forms, then evaluated for, weight variation, hardness, friability, disintegration time and dissolution rate. The results were compared with a reference Bisoprolol tablet.
Both methods of preparation wet and direct compression method gave good results, which are consistent with the requirements of British Pharmacopeia and United States Pharmacopeia. It was found that
... Show MoreGround state energies and other properties of 2S shell for some atoms as Be(Z=4), B(Z=5), C(Z=6) and N(Z=7) were calculated by using Hartree-Fock wave function. We found the values of potential energies in hartree unit (3.8369, 6.78565, 10.18852 and 14.41089) respectively and the other proprieties like expectation values of the position < r1m > were in agreement with the published results. All the studied atomic properties were normalized.
t:
The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.
What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of
... Show MoreIn this study the rate of infection in acute and chronic Toxoplasma gondii parasite that causes toxoplasmosis was determined. This study was Included 120 blood samples that collected from pregnant women revisions to some clinics and laboratories in Baghdad civil as well as 10 blood samples from non-infected women as a control group. All blood samples were collected in the first three months of the pregnancy period for detection toxoplasmosis by using serological tests of test kit ( Toxo , IgG.,Toxo , IgM ). To detect antibodies specialized type of IgG &IgM in acute and the chronic infection by Electro Clia manner using a Roche Cobas e411. The results showed that the total infection rate was (55.83)%, the rate of infection in acu
... Show More