Preferred Language
Articles
/
3xdyjJIBVTCNdQwCqbVC
Development and Validation of HPLC Method For the Detection of Fusidic Acid Loaded in Non-ionic and Cationic Nanoemulsion-Based Gels
...Show More Authors

Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentration ranging from 12.5 to 400 µg/ml. Furthermore, the approach showed good stability and achieved full recovery and an effective separation for FA from the abovementioned formulation. Besides, the protocol validation revealed good robustness at a temperature range of 23 to 27, pH 3.0 to 3.5, detection wavelength 230 to 240 nm, flow rate 0.8 and 1.2 and mobile phase contents of (78:22 to 82:18 acetonitrile/ water). The limit of Detection was obtained 1.33 µg/ml and limit of Quantification was 4.04 µg/ml for FA that uploaded through mentioned formulations. All the validation parameters were within the acceptance criteria, as per ICH , US Pharmacopeia requirements. Overall, an affordable and reproducible method could be achieved for the detection and quantification of fusidic acid within the nano-emulsion based gels formulas.

Scopus Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sat Oct 08 2016
Journal Name
Methods In Molecular Biology
Production of Adjuvant-Loaded Biodegradable Particles for Use in Cancer Vaccines
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Apr 18 2025
Journal Name
Chemical And Process Engineering Research
Spectrophotometric Determination of Sulfanilamide in Pure and in Synthetic Sample based on Condensation Reaction Method
...Show More Authors

A new, Simple, sensitive and accurate spectrophotometric methods have been developed for the determination of sulfanilamide (SNA) drug in pure and in synthetic sample. This method based on the reaction of sulfanilamide (SNA) with 1,2-napthoquinone-4-sulphonic acid (NQS) to form N-alkylamono naphthoquinone by replacement of the sulphonate  group of the naphthoquinone sulphonic acid by an amino group. The colored chromogen shows absorption maximum at 455 nm. The optimum conditions of condensation reaction forms were investigated by: (1) univariable method, by optimizing the effect of experimental variables; (different bases, reagent concentration, borax concentration and reaction time),     (2) central  composite design (CCD) including

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Oct 21 2021
Journal Name
Physical Review E
Lattice Boltzmann method with moment-based boundary conditions for rarefied flow in the slip regime
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2010
Journal Name
Journal Of Systems And Software
Development of Java based RFID application programmable interface for heterogeneous RFID system
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref