Recent reports of new pollution issues brought on by the presence of medications in the aquatic environment have sparked a great deal of interest in studies aiming at analyzing and mitigating the associated environmental risks, as well as the extent of this contamination. The main sources of pharmaceutical contaminants in natural lakes and rivers include clinic sewage, pharmaceutical production wastewater, and sewage from residences that have been contaminated by drug users' excretions. In evaluating the health of rivers, pharmaceutical pollutants have been identified as one of the emerging pollutants. The previous studies showed that the contaminants in pharmaceuticals that are widely used are non-steroidal anti-inflammatory drugs, antibiotics, antiretrovirals, and anticancer drugs. Additionally, this review demonstrated the use of analytical techniques to examine these contaminants in various kinds of River water. Due to their extremely low concentrations in the aqueous environment (about in the range of ng/L to g/L), it is necessary to apply a technique for highly sensitive and selective multicomponent simultaneous analysis to identify and quantify these products. This analytical technique provides a flexible and reliable means to identify and evaluate pharmaceutical contaminants in river water samples by combining solid phase extraction and hyphenated mass spectrometric techniques. SPE-LC/MS/MS is the main method for estimating the level of pollution.
Environmental exposure to active pharmaceutical ingredients (APIs) can have negative effects on the health of ecosystems and humans. While numerous studies have monitored APIs in rivers, these employ different analytical methods, measure different APIs, and have ignored many of the countries of the world. This makes it difficult to quantify the scale of the problem from a global perspective. Furthermore, comparison of the existing data, generated for different studies/regions/continents, is challenging due to the vast differences between the analytical methodologies employed. Here, we present a global-scale study of API pollution in 258 of the world’s rivers, representing the environmental influence of 471.4 million people across
... Show MoreWith the explosive growth of the internet and its wide usage in our lives over the last few years, data security is one of the most important for anyone using it. Data security guarantees that the sending data can be accessed and read by only authorized persons and ensure no change happens in this data. There are many methods used to achieve this goal. One of the most common methods is cryptography, which is used to convert data to unreadable data by human eyes, except if the sender uses the same algorithm and key. This paper reviews some research dealing with cryptography and shows the different methods applied in cryptography fields for various security purposes.
Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Interface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how the bonding strength
... Show MoreInterface bonding between asphalt layers has been a topic of international investigation over the last thirty years. In this condition, a number of researchers have made their own techniques and used them to examine the characteristics of pavement interfaces. It is obvious that test findings won't always be comparable to the lack of a globally standard methodology for interface bonding. Also, several kinds of research have shown that factors like temperature, loading conditions, materials, and others have an impact on surface qualities. This study aims to solve this problem by thoroughly investigating interface bond testing that might serve as a basis for a uniform strategy. First, a general explanation of how
... Show MoreUnderstanding energy metabolism and intracellular energy transmission requires knowledge of the function and structure of the mitochondria. Issues with mitochondrial morphology, structure, and function are the most prevalent symptoms. They can damage organs such as the heart, brain, and muscle due to a variety of factors, such as oxidative damage, incorrect metabolism of energy, or genetic conditions. The control of cell metabolism and physiology depends on functional connections between mitochondrial and biological surroundings. Therefore, it is essential to research mitochondria in situ or in vivo without isolating them from their surrounding biological environment. Finding and spotting abnormal alterations in mitochondria is the
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0.01-
... Show MoreCloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag
... Show More