Four batches of sertraline HCl microspheres were prepared using a poly (D-L-lactide-co-glycolide) (PLGA) polymer ( Mw. 9, 27, 30 and 83 KDa) as a delivery system. The microspheres were prepared by a dispersion/solvent extraction-evaporation method and characterized for drug loading by UV, particle size by laser diffractometry and surface morphology by scanning electron microscopy (SEM). The in vitro sertraline HCl release was studied. Spherical microspheres with a mean diameter of 21 to 26 µm loaded with 24.6 – 38.2% were produced. The in vitro drug release was shown to be depend on polymer molecular weight and also on the drug loading. Differential scanning calorimetry (DSC) was employed to investigate the physical state
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Objective- the study aim to determine the cardiac patient knowledge about anticoagulant medications using and its relationship with demographic data(age. gender. level of education. occupational). Methodology- A descriptive study(quasi-experimental)design was carried out to determine cardiac patient knowledge consider to using anticoagulant medications . Starting from(1th Jun 2017 to5th October 2018).To achieve the objectives of the study, a non-probability sample (a purposive sample) consisted of random sample comprised of (30) patients were taken anticoagulant medications ..The measurement of patient knowledge were collected through the use of questionnaire which is related to patient knowledge toward using the anticoagulant medication
... Show MoreAthletics are different from other games as a competition between individuals to show their competence and physical ability to achieve new record numbers in the various activities and various between the boards, jumping and throwing and each type of these activities in particular performance so found the researcher to find the method of training resistors in the development of special power and achievement In the effectiveness of javelin, where the researchers chose the sample of the athletes from the specialized school of athletics to effectively throw the spear at the ages of 15-17 years and carried out the tests of the research, which includes the strength of the speed of the arms and explosive power and The various resistance exercise
... Show MoreAbstract
The use of electronic valves is commonly available. yet, the most
common is the techniques of communications as prod casting transmitter that
are used by these valves in addition to their use in communication tools as far
distance telephone, electronic measuring techniques , and others.
In this study, an attempt is endeavored for improving the efficiency of the
vacuum micro- valves(GI-19b) through activating their internal surfaces by the
use of ionic pumping which is used for treating valves which are out of order
(because of sedimentation some materials and oxide on its poles). The
existence of these materials and oxide increase the sum of current leakage
moving in between. The use of ionic pumpin
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More