Introduction: Nitrofurantoin (NFT) is abroad spectrum bactericidal antibiotic. The bioavailability of NFT is affected by many factors. Samafurantin® tablets containing 50 mg NFT were manufactured by Samarra drug industry. Urinary excretion studies were employed since; the urinary tract is the main site of NFT action and excretion. Objective: The objective of the study was to investigate the effect of Uricol® and food on secondary pharmacokinetic parameters of Samafurantin® tablets with different doses by applying urinary data. Methods: Twelve healthy male volunteers participated in this study. Urine samples were collected from each volunteer after overnight fasting at a specified time intervals which considered as a blank sample for measuring urine pH of urine. After that, volunteers were randomly divided into two groups (G1 and G2) each of six. Group 1 was administered 100 mg of NFT (Two tablets of 50 mg Samafurantin®) while, G2 was administered 200 mg of NFT (Four tablets of 50 mg Samafurantin®) as a single oral dose. Both groups administered the dose on an empty stomach (fasting), along with one Uricol® of 5 g sachet on fasting, and on full stomach after eating a standard breakfast after 1-week washout period between each experiment and another. For each experiment, urine samples were collected from each volunteer from 0.25 to 7 h post dosing. In addition, the volume of each void urine sample was measured. Results: Both groups (G1 and G2) showed only slight differences in the pH of urine after administration of Samafurantin® as compared with that of the blank. While, the pH of urine for both groups was higher after administration of Samafurantin® tablets along with Uricol® 5 g. In both groups, each of Uricol® and food exhibited no significant differences (P < 0.05) in secondary pharmacokinetic parameters of NFT; the rate constant of elimination (Kel) and absorption (Ka) and consequently their half-life (t0.5 el and t0.5 abs) as long as the drug followed first-order kinetics. While significant differences (P < 0.05) were observed for maximum excretion rate (ExRmax), cumulative amount excreted in urine (CAe) and CAe as percentage of the dose. This could be attributed to the pH-change of urine by Uricol® which alkalinized the urinary and kidney tract or delaying gastric emptying by food. Same observations were attained when comparing G1 with G2 after administration of NFT on fasting. Conclusions: Administration of Samafurantin® tablets at higher doses, along with Uricol® or with food increases secondary pharmacokinetic parameters related to the rate and extent of absorption and elimination without significant changes in their corresponding rate constants and half-lives. © 2018 Drug Invention Today.
The preparation and characterization of innovative nanocomposites based on zinc oxide nanorods (ZNR) encapsulated by graphene (Gr) nanosheets and decorated with silver (Ag), and cupper (Cu) nanoparticles (NP) were studied. The prepared nanocomposites (ZNR@Gr/Cu-Ag) were examined by different techniques including Field Emission Scanning Electron Microscope (FESEM), Transmission electron microscopy (TEM), Atomic force microscopy (AFM), UV-Vis spectrophotometer and fluorescence spectroscopy. The results showed that the ZNR has been good cover by five layers of graphene and decorated with Ag and Cu NPs with particles size of about 10-15 nm. The ZNR@Gr/Cu-Ag nanocomposites exhibit high absorption behavior in ultraviolet (UV) region of sp
... Show MoreBackground: Incorporation of chemical additives has long been a technique used to improve properties of the gypsum products. The purpose of this work was to study the effects of adding a combination of gum Arabic and calcium hydroxide to a type III dental stone and type IV improved die stone with different proportion. The effect on water/powder ratio, and surface hardness was determined. Material and method: Both material stone and die stone were blended with two proportion of additives so that each material was mixed twice but with different proportion of gum Arabic (0.1% and 0.2%) and calcium hydroxide (0.5 % and 0.3%). Data for hardness were subjected to two-way analysis of variance. Results: The results revealed that the chemical additi
... Show MoreInformation hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key
... Show MoreIn this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More