Preferred Language
Articles
/
3xdyjJIBVTCNdQwCqbVC
Development and Validation of HPLC Method For the Detection of Fusidic Acid Loaded in Non-ionic and Cationic Nanoemulsion-Based Gels
...Show More Authors

Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentration ranging from 12.5 to 400 µg/ml. Furthermore, the approach showed good stability and achieved full recovery and an effective separation for FA from the abovementioned formulation. Besides, the protocol validation revealed good robustness at a temperature range of 23 to 27, pH 3.0 to 3.5, detection wavelength 230 to 240 nm, flow rate 0.8 and 1.2 and mobile phase contents of (78:22 to 82:18 acetonitrile/ water). The limit of Detection was obtained 1.33 µg/ml and limit of Quantification was 4.04 µg/ml for FA that uploaded through mentioned formulations. All the validation parameters were within the acceptance criteria, as per ICH , US Pharmacopeia requirements. Overall, an affordable and reproducible method could be achieved for the detection and quantification of fusidic acid within the nano-emulsion based gels formulas.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Farmacia
LASMIDITAN NANOEMULSION BASED IN SITU GEL INTRANASAL DOSAGE FORM: FORMULATION, CHARACTERIZATION AND IN VIVO STUDY
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Controlled Release
The efficacy of aerosol treatment with non-ionic surfactant vesicles containing amphotericin B in rodent models of leishmaniasis and pulmonary aspergillosis infection
...Show More Authors

View Publication
Scopus (50)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparations of Organoclay Using Cationic Surfactant and Characterization of PVC/ (Bentonite and Organoclay) Composite Prepared via Melt Blending Method
...Show More Authors

Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively.  The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Evergreen
Development, Validation, and Performance Evaluation of An Air-Driven Free-Piston Linear Expander Numerical Model
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Effectiveness and safety of non-fixation method in cochlear implantation
...Show More Authors

ABSTRACTBackground: cochlear implants are electronic devices that convert sound energy into electrical signals to stimulate ganglion cells and cochlear nerve fibers. These devices are indicated for patients with severe to profound sensorineural hearing losses who receive little or no benefit from hearing aids. The implant basically takes over the function of the cochlear hair cells. The implant consists of external components (microphone, speech processor and transmitting coil) and internal components (receiver stimulator and electrode array). The implant is inserted via a trans mastoid facial recess approach to the round window and scala tympani.Objectives: to determine the effectiveness and safety of non fixation method in cochlear imp

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Characterization of Topical Letrozole Nanoemulsion for Breast Cancer
...Show More Authors

Letrozole (LZL) is a non-steroidal competitive aromatase enzyme system inhibitor. The aim of this study is to improve the permeation of LZL through the skin by preparing as nanoemulsion using various numbers of oils, surfactants and co-surfactant with deionized water. Based on solubility studies, mixtures of oleic acid oil and tween 80/ transcutol p as surfactant/co-surfactant (Smix) in different percentages were used to prepare nanoemulsions (NS). Therefore, 9 formulae of (o/w) LZL NS were formulated, then pseudo-ternary phase diagram was used as a useful tool to evaluate the NS domain at Smix ratios: 1:1, 2:1 and 3:1.

View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Research Journal Of Chemistry And Environment
HPLC and Atomic Absorption Spectrometry for the Analysis of Pharmacological Activities in Soursop
...Show More Authors

Soursop is useful in treating diseases and the bioactive components of the fruit are beneficial in the treatment of gastrointestinal parasites. Annona muricata contains flavonoids, phenolic acids, and tannins in its leaves, pulp, and seeds. The current study provided an accurate analytical method for the pharmacologically active components, including glutathione, potassium, and vitamin B6, in soursop fruit samples of soursop using high-performance liquid chromatography and atomic absorption spectrometry. The fruits of the soursop were cleaned, peeled, and sliced into tiny pieces. The juice was chilled and kept in glass bottles. After blending the fruits with distilled water, they were placed on a magnetic stirrer and left for 72 hours. For

... Show More