Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors
Abstract
Objective: the idea of this study to improve transdermal permeability of Methotrexate using eucalyptus oil, olive oil and peppermint oil as enhancers.
Method: eucalyptus oil (2% and 4%), peppermint oil (2% and 4%) and olive oil (2% and 4%) all used as natural enhancers to develop transdermal permeability of Methotrexate via gel formulation. The gel was subjected to many physiochemical properties tests. In-vitro release and permeability studies for the drug were done by Franz cell diffusion across synthetic membrane, kinetic model was studied via korsmeyer- peppas equation.
Result: the results demonstrate that safe, nonirritant or cause necrosis to rats' skin and stable till 60 days gel was successfully formulated.<
Solid dispersion is an attractive tool of pharmaceutical technology used to improve the physical properties of drugs. Among these properties is to enhance the solubility of the drugs.
Rebamipide is a poorly soluble drug of class IV of biopharmaceutical classification system (BCS).
Rebamipide is used as potent antiulcer, mucoprotective drug, by stimulating the generation of prostoglandine enhanced mucosal protection.
Rebamipide was formulated as a solid dispersion using different polymers such as pluronic F-127, PEG6000, PVP K30, and TPGS by using different preparation methods solvent evaporation, fusion, and kneading methods.
It was seen that rebamipide was successfully dispersed in a homogenous solid dispersion matrix by sol
This article showcases the development and utilization of a side-polished fiber optic sensor that can identify altered refractive index levels within a glucose solution through the investigation of the surface Plasmon resonance (SPR) effect. The aim was to enhance efficiency by means of the placement of a 50 nm-thick layer of gold at the D-shape fiber sensing area. The detector was fabricated by utilizing a silica optical fiber (SOF), which underwent a cladding stripping process that resulted in three distinct lengths, followed by a polishing method to remove a portion of the fiber diameter and produce a cross-sectional D-shape. During experimentation with glucose solution, the side-polished fiber optic sensor revealed an adept detection
... Show MoreThe Paleocene-Eocene Thermal Maximum (PETM) event, which represented a sudden and abnormal rise in temperature during the early Cenozoic Era, is regarded as one of the most important global geologic phenomena. Two important index microfossils (nannoplankton and Ostracoda) were utilised to understand and predict the paleoenvironment and describe the changes during this period. The basis of the study was 12 cutting samples taken from Aaliji and the lower part of Jaddala formations of a subsurface section of (Ba-8) borehole in central Iraq. Some geophysical data were used to determine the upper and lower contacts of the Aaliji Formation and define the shale rate in the studied formations. The micropaleontologic investigation reveals
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show MoreIn the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each MMS rather t
... Show MoreIn the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each M
... Show MoreTwo molecular imprinted polymer (MIP) membranes for Levofloxacin (LEV) were prepared based on PVC matrix. The imprinted polymers were prepared by polymerization of styrene (STY) as monomer, N,N methylene di acrylamide as a cross linker ,benzoyl peroxide (BPO) as an initiator and levofloxacin as a template. Di methyl adepate (DMA) and acetophenone (AOPH) were used as plasticizers , the molecular imprinted membranes and the non molecular imprinted membranes were prepared. The slopes and detection limits of the liquid electrodes ranged from -21.96 – -19.38 mV/decade and 2×10-4M- 4×10-4M, and Its response time was around 1 minute, respectively. The liquid electrodes were packed with 0.1 M standar
... Show MoreSmishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show More