This study designed to prepare ultrafine apixaban (APX) o/w nanoemulsion (NE) based gel with droplet size below 50 nm as a good method for transdermal APX delivery without using permeation enhancer, alternatively, the formulation components itself act as permeation enhancer. APX, a potent oral anticoagulant drug that selectively and directly inhibit coagulation factor Xa, was selected as a good candidate for transdermal delivery as it displays poor water solubility (0.028 mg/mL) and low bioavailability (50%). APX-NE gel was prepared using triacetin, triton-x-100 and carbitol as oil phase, surfactant and cosurfactant respectively, while Carbopol 940 used as a gelling agent. Ex vivo permeation of APX-NE gel through human stratum corneum reveal
The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreThe aim of this research is to prepare a set of complexes with the general formula [M(HMB)n] , where M=VO (II) , Cr(III) and Cu(II) while n=2,3,2 respectively resulting from the reaction of anew ligand [N'-(2-hydroxy-3-methoxybenzyl)-4-methylbenzohydrazide] (HMB) derived from the reaction of the tow substances (4-methylbenzohydrazide and 2-hydroxy-3-methoxy benzaldehyde) with metal ions. The prepared compounds were identified by several spectroscopic methods such as Infrared, Nuclear Magnetic Resonance and Electronic Spectra. From the results of the measurements, it was suggested that the prepared complexes have different geometries such as square planar (Cu), square pyramidal (VO) and octahedral (Cr). DFT simulations backed up
... Show MoreHedera helix L. plant belongs to the family Araliaceae that provide a host of bioactive compounds (mainly saponins) of important biological activities, like spasmolytic, secretolytic, anti-inflammatory, and antibacterial activities. Literature survey revealed that there was no previously study concerning H. helix L. which is cultivated in Iraq, so we decided to carry out this study which include extraction, isolation, purification and identification of biologically important triterpenoid saponin hederacoside C from leaves of H. helix L. Extraction of hederacoside C was carried out using two methods; in the first method maceration was done with methanol 99.8% and in the second method soxhlet extraction wit
... Show MoreThin films Tin sulfide SnS pure and doped with different ratios of Cu (X=0, 0.01, 0.03 and 0.05) were prepared using thermal evaporation with a vacuum of 4*10-6mbar on two types of substrates n-type Si and glass with (500) nm thickness for solar cell application. X-ray diffraction and AFM analysis were carried out to explain the influence of Cu ratio dopant on structural and morphological properties respectively. SnS phase appeared forming orthorhombic structure with preferred orientation (111), increase the crystallinity degree and surface roughness with increase Cu ratio. UV/Visible measurement revealed the decrease in energy gap from 1.9eV for pure SnS to 1.5 for SnS: Cu (0.05) making these samples suitable f
... Show More