The development of a meaningful dissolution procedure for drug products with limited water solubility has been a challenge to both the pharmaceutical industry and the agencies that regulate them. Natural surfactants aid in the dissolution and subsequent absorption of drugs with limited aqueous solubility. In vitro, various techniques have been used to achieve adequate dissolution of the sparingly water – soluble or water insoluble drug products such as the use of mechanical methods (i.e., increased agitation and the disintegration method) or hydro alcoholic medium or large volumes of medium. The necessity of assuring the quality of drugs , especially those with low aqueous solubility and in vivo absorption , has led to the development and evaluation of new techniques that can reduce the time and cost of analysis. This study has been examines the efficiency and accuracy of an automated dissolution system, fitted with a simple, integrated, for analysis of generic drugs. Sodium Selenite 200 ?g tablets was chosen as model drugs for this study and comparison was made with a conventional analysis based on flameless atomic absorption spectrophotometer (AAS). The analytical system under study gave reproducible and accurate results. Low instrumentation cost was demonstrated which is provide satisfactory elemental drugs analysis to a standard at least as good as that achieved using AAS.
A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreAbstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreBased on the results of standard penetration tests (SPTs) conducted in Al-Basrah governorate, this research aims to present thematic maps and equations for estimating the bearing capacity of driven piles having several lengths. The work includes drilling 135 boreholes to a depth of 10 m below the existing ground level and three standard penetration tests (SPT) at depths of 1.5, 6, and 9.5 m were conducted in each borehole. MATLAB software and corrected SPT values were used to determine the bearing capacity of driven piles in Al-Basrah. Several-order interpolation polynomials are suggested to estimate the bearing capacity of driven piles, but the first-order polynomial is considered the most straightforward. Furthermore, the root means squar
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show More