Mesoporous silica (MPS) nanoparticle was prepared as carriers for drug delivery systems by sol–gel method from sodium silicate as inexpensive precursor of silica and Cocamidopropyl betaine (CABP) as template. The silica particles were characterized by SEM, TEM, AFM, XRD, and N2adsorption–desorption isotherms. The results show that the MPS particle in the nanorange (40-80 nm ) with average diameter equal to 62.15 nm has rods particle morphology, specific surface area is 1096.122 m2/g, pore volume 0.900 cm3/g, with average pore diameter 2.902 nm, which can serve as efficient carriers for drugs. The adsorption kinetic of Ciprofloxacin (CIP) drug was studied and the data were analyzed and found to match well with pseudo-first order kinetic model. The CIP drug-loaded mesoporous silica (CIP-mSiO2) nanoparticles has capacity of about 16.3 mg drug/ mg mSiO2 were achieved, and capable of releasing 26% and 98.6% of their drug content after 90 min in water and PBS solution(pH,7.4) respectively. In-vitro controlled release studies of CIP in Simulated Body Fluid were carried out under stirring conditions. A study on release kinetics and mechanism using Koresmeyer-Pepps model, first order kinetic, and kopcha model shows that the Korsmeyer-Peppas and Kopcha models, both conform more closely to the release data.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditio
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreBackground: Adenoid cystic carcinoma (ACC) constitutes about 4% of salivary epithelial tumors and is the second common malignant epithelial salivary gland tumor involving both the major and minor salivary glands. Aims of the study is to evaluate immunohistochemical expression of Ki67 and p53 proteins in ACC. Materials and Methods: immunohistochemical analyses of fifteen cases of formalin – fixed paraffin – embedded tissues blocks of ACC of salivary glands using ki67 and p53 antibodies. Results: ki67 was expressed in 6 of 15 ACC (40%) while p53 aberration was demonstrated in 11 of tumor (73.3%). There was a statistically significant difference between the expression of ki67 and p53 proteins in ACC cases (p value = 0.041). Pearson’s cor
... Show More