Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentration ranging from 12.5 to 400 µg/ml. Furthermore, the approach showed good stability and achieved full recovery and an effective separation for FA from the abovementioned formulation. Besides, the protocol validation revealed good robustness at a temperature range of 23 to 27, pH 3.0 to 3.5, detection wavelength 230 to 240 nm, flow rate 0.8 and 1.2 and mobile phase contents of (78:22 to 82:18 acetonitrile/ water). The limit of Detection was obtained 1.33 µg/ml and limit of Quantification was 4.04 µg/ml for FA that uploaded through mentioned formulations. All the validation parameters were within the acceptance criteria, as per ICH , US Pharmacopeia requirements. Overall, an affordable and reproducible method could be achieved for the detection and quantification of fusidic acid within the nano-emulsion based gels formulas.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreAge, hypertension, and diabetes can cause significant alterations in arterial structure and function, including changes in lumen diameter (LD), intimal-medial thickness (IMT), flow velocities, and arterial compliance. These are also considered risk markers of atherosclerosis and cerebrovascular disease. A difference between right and left carotid artery blood flow and IMT has been reported by some researchers, and a difference in the incidence of nonlacunar stroke has been reported between the right and left brain hemispheres. The aim of this study was to determine whether there are differences between the right and left common carotid arteries and internal carotid arteries in patient
In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.
In this paper, Pentacene based-organic field effect transistors (OFETs) by using different layers (monolayer, bilayer and trilayer) for three different gate insulators (ZrO2, PVA and CYEPL) were studied its current–voltage (I-V) characteristics by using the gradual-channel approximation model. The device exhibits a typical output curve of a field-effect transistor (FET). Source-drain voltage (Vds) was also investigated to study the effects of gate dielectric on electrical performance for OFET. The effect of capacitance semiconductor in performance OFETs was considered. The values of current and transconductance which calculated using MATLAB simulation. It exhibited a value of current increase with increasing source-drain voltage.
In this paper, Pentacene based-organic field effect transistors (OFETs) by using different layers (monolayer, bilayer and trilayer) for three different gate insulators (ZrO2, PVA and CYEPL) were studied its current–voltage (I-V) characteristics by using the gradual-channel approximation model. The device exhibits a typical output curve of a field-effect transistor (FET). Source-drain voltage (Vds) was also investigated to study the effects of gate dielectric on electrical performance for OFET. The effect of capacitancesemiconductor in performance OFETs was considered. The values of current and transconductance which calculated using MATLAB simulation. It exhibited a value of current increase with increasing source-drain voltage.
This study showed the basic features of corporate tax in Iraq by showing what was in the Income Tax Law in force .The study aims of this to indicate the role of tax corprates in tax revenue and then the possibility of strengthening the revenue of this tax as an important source of local funding sources in the form that is with him reduce dependence on oil revenues to finance the general budget in Iraq, the risks and the study found a number of conclusions from the most important: that the corporate tax comes in the introduction to the components of the income tax structure in terms of relative importance and formed a revenue source of prime The gross proceeds of the income tax in Iraq, where it contributed to more than a quarter of that
... Show More