Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A.E. ? Bron and Burk(UK) London
The rapid development of Internet of Things (IoT) devices and their increasing numbers have caused a tremendous increase in network traffic and a wider range of cyber-attacks. This growing trend has complicated the detection process for traditional intrusion detection systems and heightened the challenges faced by these devices, such as imbalanced and large training data. This study presents a cohesive methodology of a series of intelligent techniques to prepare clean and balanced data for training the first (core) layer of a robust hierarchical intrusion detection system. The methodology was built by cleaning and compressing the data using an Autoencoder and preparing a strong latent space for balancing using a hybrid method that combines
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
In this investigation a high density polyethylene (HDPE) was used as a substitute to polyvinylchloride in the production of lead acid battery separators. This has been achieved by preparing mixtures of different percentages of the feed materials which include a high density polyethylene (HDPE) locally produced, filler materials such as silica and oils such as dioctylphthalate (DOP) or paraffin which were added to the mixture to improve the final properties of the separator. The materials were compounded by two roll-mills under the same conditions. The following parameters are involved: &nb
... Show MoreEnvironmental exposure to active pharmaceutical ingredients (APIs) can have negative effects on the health of ecosystems and humans. While numerous studies have monitored APIs in rivers, these employ different analytical methods, measure different APIs, and have ignored many of the countries of the world. This makes it difficult to quantify the scale of the problem from a global perspective. Furthermore, comparison of the existing data, generated for different studies/regions/continents, is challenging due to the vast differences between the analytical methodologies employed. Here, we present a global-scale study of API pollution in 258 of the world’s rivers, representing the environmental influence of 471.4 million people across
... Show MoreEcological risk assessment of mercury contaminant has a means to analyze the ecological risk aspect of ecosystem using the potential impact of mercury pollution in soil, water and organism. The ecological risk assessment in a coastal area can be shown by mangrove zonation, clustering and interpolation of mercury accumulation. This research aims to analyze ecological risk assessment of potential mercury (including bioaccumulation and translocation) using indicators of species distribution, clustering, zonation and interpolation of mercury accumulation. The results showed that the Segara Anakan had a high risk of mercury pollution, using indicators like as the potential of mercury contaminant in water body was 0137±0.0137 ppm, substrate a
... Show MoreThe study of properties of space of entire functions of several complex variables was initiated by Kamthan [4] using the topological properties of the space. We have introduced in this paper the sub-space of space of entire functions of several complex variables which is studied by Kamthan.
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show More