Preferred Language
Articles
/
bsj-1038
Study of the Porosity of Certain pharmaceutical Tablets using Mercury Intrusion Porosimeter
...Show More Authors

Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A.E. ? Bron and Burk(UK) London

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study the Characteristic Performance of Trickling Filter for Pharmaceutical Waste Treatment
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Ndt & E International
Porosity evaluation of in-service thermal barrier coated turbine blades using a microwave nondestructive technique
...Show More Authors

View Publication
Scopus (19)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
A turbidimetric method for the quantitative determination of cyproheptadine hydrochloride in tablets using an optoelectronic detector based on the LEDs array
...Show More Authors

View Publication Preview PDF
Scopus (14)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Gsc Advanced Research And Reviews
Mercury pollution and its impact on aquatic organisms
...Show More Authors

Mercury is a heavy metal that is extremely toxic. There are three types of it: inorganic, organic, and elemental. Mercury in all its forms has been shown to have harmful effects on living things. It can multiply its concentration from lower to higher trophic levels and accumulate in the body's various tissues. Aquatic organisms bodies have been exposed to mercury mostly through various human activities. The largest source of mercury pollution in the air is thermal power plants that mostly use coal as fuel. It is carried to a body of water after being deposited on the ground surface from the air. The way it enters the food chain is through aquatic plants and animals. Mercury accumulations in the kidney, liver, gills, or gonadal tissues of sp

... Show More
Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Study of the heat treatment effect on electrical and porosity of Cermet Coating layers (Zro2 – Y2O3) prepared by Thermal Spraying
...Show More Authors

The technical of Flame Thermal Spray had been used in producing a cermet
composite based on powders of stabilized zirconium oxide containing amount of
Yatteria oxide (ZrO2- 8Y2O3) reiforced by minerals powders of bonding material
(Ni-Cr- Al- Y) in different rates of additions (25, 35, 50) on stainless steel base type
(304) after preparing it by the way of Grit Blasting.
Before heat treatment, the coated cermet layers were characterized for porosity
and electric resistivity. All samples were heat treated in vacuum furnace at different
temperature and times. The physical tests had been operated after heat treatment
and gave best results especially porosity, which found to be reduced dramatically
and producing hig

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Optiglaze Coating on the Staphylococcus aurous and Porosity of Heat Cured Acrylic Material
...Show More Authors

Background: Polishing technique for acrylic resin material have great effect on properties of acrylic material and bacterial colonization such as staphylococcus aurous, which are responsible for many acrylic prosthetic infections such as the commonly ocular infections. Ineffective polishing technique could affect roughness and subsequently porosity of acrylic materials.So, a new effective method for polishing acrylic was used depending on the use of optiglaze coating material. So, this study aimed to evaluate the effect of optiglaze polishing on porosity of acrylic resin material and staphylococcus aurous activity in comparison to conventional polishing technique. 

Materials and methods: Specimen(n=120) were prepared :20 spe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 17 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Prediction Using Artificial Neural Network of Bed Porosity and Solid Holdup in Viscous 3-Phase Inverse Fluidization
...Show More Authors

In the present investigation, bed porosity and solid holdup in viscous three-phase inverse fluidized bed (TPIFB) are determined for aqueous solutions of carboxy methyl cellulose (CMC) system using polyethylene and polypropylene as  a particles with low-density and diameter (5 mm) in a (9.2 cm) inner diameter with height (200 cm) of vertical perspex column. The effectiveness of gas velocity Ug , liquid velocity UL, liquid viscosity μL, and particle density ρs on bed porosity BP and solid holdups εg were determined. The bed porosity increases with "increasing gas velocity", "liquid velocity", and "liquid viscosity". Solid holdup decreases with increasing gas, liquid

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 22 2016
Journal Name
Der Pharma Chemica
Evaluation of Commercial Antacid Tablets in Iraq
...Show More Authors

Antacids are commonly used drugs which are considered inert and free of pharmacological effect by many patients and physicians. They are weak bases that neutralize the gastric acid and relief pain. These weak bases dissociate to neutralize gastric acid and form neutral salts. The ultimate goal of antacid therapy is to reduce the concentration and a total load of acid in gastric juice to a pH 4 - 5. This in vitro study was promised to study the acid neutralizing capacity (ANC) of six commonly available antacids tablets in the Iraqi market by using back titration method. The highest ANC values were for Rennie (17.131± 0.083 and 16.926± 0.052 mEq) in two different hydrochloric acid (HCl) concentrations 1N and 0.5 N, respectively. The static

... Show More
Scopus (1)
Scopus
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.