Diacerein (DCN) is a semi-synthetic anthraquinone derivative of Rhein that is indicated for the management of osteoarthritis. Diacerein exhibits poor dissolution in the GIT fluids and suffers from low bioavailability upon oral administration in addition to the laxative effect of Rhein metabolites. The aim of the present study was to develop novasomal vesicles with optimized entrapment efficiency and size to serve as a carrier for transdermal delivery of diacerein. Novasomal vesicles were prepared by thin film hydration method thin film hydration. The prepared vesicles were optimized utilizing different surfactant to cholesterol molar ration, sonication type, different sonication times and varying fatty acid level. The prepared vesicles were characterized for drug entrapment efficiency, vesicle size and PDI. The best formula was further investigated for zeta potential ten TEM and compatibility study by FTIR analysis. Results showed that F6 was the best formula regarding it vesicle size 275.2± 2.68nm , entrapment efficiency 69.415± 0.234 % and PDI 0.309± 0.016. In conclusion , novasomal dispersion could be successfully formulated with thin film hydration method.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreLithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show Moreobjective : To assess for Psychological Problems. The study was carried out from 1st of December 2004 to 15th
March, 2005.
Mythology : A descriptive comparative study was conducted for elder in the geriatric home and the community;
A questionnaire was constructed to achieve the purposes of the study; it includes two parts dealing with the
elder demographic characteristics and psychological problems.
A purposive (no probability) sampling of (100) elderly include (50) elderly from the Geriatric Home and (50)
elderly from the community.
Data were collected and analyzed through a descriptive statistical approach (frequency, percentage, mean and
mean of scores, Standard deviation, Relative Sufficiency).
Result : the
It is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations. The methods are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec
... Show MoreTwelve N-(6-sustirured benzothanol-2-y1) succinamic acids and 3-(6-substitted benzonathol-2-y1)-carbamoyl propionyl chloride were synthesized in good yields from reaction of benzonathol2-yl)