Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentration ranging from 12.5 to 400 µg/ml. Furthermore, the approach showed good stability and achieved full recovery and an effective separation for FA from the abovementioned formulation. Besides, the protocol validation revealed good robustness at a temperature range of 23 to 27, pH 3.0 to 3.5, detection wavelength 230 to 240 nm, flow rate 0.8 and 1.2 and mobile phase contents of (78:22 to 82:18 acetonitrile/ water). The limit of Detection was obtained 1.33 µg/ml and limit of Quantification was 4.04 µg/ml for FA that uploaded through mentioned formulations. All the validation parameters were within the acceptance criteria, as per ICH , US Pharmacopeia requirements. Overall, an affordable and reproducible method could be achieved for the detection and quantification of fusidic acid within the nano-emulsion based gels formulas.
Mixed ligand complexes of bivalent metal ions, viz ; M= Co(II),Ni(II),Cu(II), Zn(II), Cd (II), and Hg(II) of the composition [M(Anth)2(TMP)] in 1:2:1 molar ratio, (where . AnthrH= Anthranilic acid (C7H7NO2) and Trimethoprime (TMP) = (C14H18N4O3) have been synthesized and characterized by repeated melting point determination, Solubility, Molar conductivity (Λm ),determination the percentage of the metal (M%) in the complexes by (AAS), FT-IR, magnetic susceptibility measurements [µeff (BM)] and electronic spectral data. The two ligands and their metal complexes have been screened for their bacterial activity against selected microbial strains (Gram +ve) & (Gram -ve).
Abstract:
Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas
... Show MoreThe increasing Global Competitive and the continuous improvement in information technology has led the way to the development of the modern systems and using modern techniques. One of these techniques is benchmarking style and Total Quality Management all of them are used to improve the production process and target rid from the losts on the other side.
The Benchmarking style has become a very important for all the industrial systems and the serving systems as well. And an instrument to improve their performance specially those which are suffering from the highness of the costs or waste in time on the other side.
This study aims to depend on virtual Benchmarking style in the eval
... Show MoreThis research attempts to dust briefly the concept of deliberativeness in Arabic rhetoric, which was only understood in light of modern Western linguistics, starting with its definition (conformity of speech to the necessity of the case with its eloquence) which contains the elements of the entire creative process as shown by this brief study, in the first chapter that He was labeled (deliberative in Western and Arab thought), and we had started it with deliberation in western thought in the first topic in an attempt to highlight the western concepts of this term so that we could discern its originality in the Arab rhetorical heritage that came next in the second topic (deliberative in Arab thought), explaining the appropriate Th
... Show MoreIn this article the nanoparticles synthesis of ZnO (Nps) by using the precipitation method at concentrations range (0.5, 0.25, 0.125, 0.0625, 0.03125) mg/mL and then activity was examined against Streptococcus spp that causing dental caries in vitro by well diffusion method, find these concentrations effected in these bacteria and better concentration is 0.03125. ZnO Nps were characterization by EDS to prove this particles are ZnO, and also characterized by atomic force microscope (AFM), X-ray Diffraction (XRD) and TEM, from these technic found that the average size about 30.52 nm and hexagonal shape. The UV-visible result reveals that the large band is observed at 340.8 nm, Zeta potential show that the surface charge is 30.19 mv an
... Show MoreABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The article aims to study the liquidity that is required to be provided optimally and the profitability that is required to be achieved by the bank, and the impact of both of them on the value of the bank, and their effect of both liquidity and profitability on the value of the bank. Hence, the research problem emerged, which indicates the extent of the effect of liquidity and profitability on the value of the bank. The importance of the research stems from the main role that commercial banks play in the economy of a country. This requires the need to identify liquidity in a broad way and its most important components, and how to
... Show More