The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-release duration and dissolution efficiency were examined in various dissolution media, such as physiological pH (7.4) and simulated stomach fluid (3.4). Consequently, the optimized double-layer for hydrophobic molecules delivery system showed a gradual release of hydrophobic molecules in the and in physiological pH, indicating its novelty for using as a platform for hydrophobic molecules delivery.
In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe objective of this study is to explain the role of credit policies in agricultural development of Iraq during the period 1979-1989 which were represented by the policy of co-operative agricultural bank the organization that responsible to finance agricultural sector for various reasons. It has been shown that there was no clear credit policy existed during the period concerned due to the differences between loans from year. The loan growth rate was low in general comparing with objectives of the agricultural development plans, a low production rates comparing with loans paid, the growth rate of average number of trees in each donum and the growth rate of livestock number was also low.In conclusion there should be a clear plan for cred
... Show MoreThe products of composites material are very sesetive to many variables, such as manufacturing process, additive materials, …. etc. Filler or additive plays a major role to determine the formation of the properties and behavior of the composites. In this study, polyethylene terephthalate-based compounds were produced and characterized. The work is concerned to prepare samples of Polyethylene terephthalate (PET) - zinc-ferrite (ZnFe2O4) with different addition ratio as zinc-ferrite (1, 2, 5, 10, 15 and 20) wt% obtained from mixing the solution with a hot pressing method applied under optimum conditions. The densities of the composites for all samples were calculated. Through the work the diffusion of zinc-ferrite i
... Show MoreThe detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed
... Show MoreThe gas sensing properties of undoped Co3O4 and doped with Y2O3 nanostructures were investigated. The films were synthesized using the hydrothermal method on a seeded layer. The XRD, SEM analysis and gas sensing properties were investigated for the prepared thin films. XRD analysis showed that all films were polycrystalline, of a cubic structure with crystallite size of (12.6) nm for cobalt oxide and (12.3) nm for the Co3O4:6% Y2O3. The SEM analysis of thin films indicated that all films undoped Co3O4 and doped possessed a nanosphere-like structure.
The sensi
... Show MoreDarifenacin hydrobromide is a selective ?3 receptor antimuscarinic drug and it is used in the management of urinary frequency, urgency, and incontinence in detrusor instability. It slightly soluble in water, undergoes extensive hepatic first-pass metabolism and has short elimination half-life (3–4 hours). Therefore, It has low bioavailability (15.4 % - 18.6 %). Darifenacin hydrobromide loaded NLCs were formulated by emulsification sonication using different ratios of solid lipid to liquid lipid, different types of surfactants, and different concentration of surfactants. Formula sixteen was considered as an optimized formula based on its particle size, PDI, zeta potential and entrapment efficiency. Formula sixteen subjected t
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show More