Introduction: Nitrofurantoin (NFT) is abroad spectrum bactericidal antibiotic. The bioavailability of NFT is affected by many factors. Samafurantin® tablets containing 50 mg NFT were manufactured by Samarra drug industry. Urinary excretion studies were employed since; the urinary tract is the main site of NFT action and excretion. Objective: The objective of the study was to investigate the effect of Uricol® and food on secondary pharmacokinetic parameters of Samafurantin® tablets with different doses by applying urinary data. Methods: Twelve healthy male volunteers participated in this study. Urine samples were collected from each volunteer after overnight fasting at a specified time intervals which considered as a blank sample for measuring urine pH of urine. After that, volunteers were randomly divided into two groups (G1 and G2) each of six. Group 1 was administered 100 mg of NFT (Two tablets of 50 mg Samafurantin®) while, G2 was administered 200 mg of NFT (Four tablets of 50 mg Samafurantin®) as a single oral dose. Both groups administered the dose on an empty stomach (fasting), along with one Uricol® of 5 g sachet on fasting, and on full stomach after eating a standard breakfast after 1-week washout period between each experiment and another. For each experiment, urine samples were collected from each volunteer from 0.25 to 7 h post dosing. In addition, the volume of each void urine sample was measured. Results: Both groups (G1 and G2) showed only slight differences in the pH of urine after administration of Samafurantin® as compared with that of the blank. While, the pH of urine for both groups was higher after administration of Samafurantin® tablets along with Uricol® 5 g. In both groups, each of Uricol® and food exhibited no significant differences (P < 0.05) in secondary pharmacokinetic parameters of NFT; the rate constant of elimination (Kel) and absorption (Ka) and consequently their half-life (t0.5 el and t0.5 abs) as long as the drug followed first-order kinetics. While significant differences (P < 0.05) were observed for maximum excretion rate (ExRmax), cumulative amount excreted in urine (CAe) and CAe as percentage of the dose. This could be attributed to the pH-change of urine by Uricol® which alkalinized the urinary and kidney tract or delaying gastric emptying by food. Same observations were attained when comparing G1 with G2 after administration of NFT on fasting. Conclusions: Administration of Samafurantin® tablets at higher doses, along with Uricol® or with food increases secondary pharmacokinetic parameters related to the rate and extent of absorption and elimination without significant changes in their corresponding rate constants and half-lives. © 2018 Drug Invention Today.
This present study demonstrated that liver was involved in 14 %of typhoid patients manifesting with hepatomegaly. Elevation of serum enzymes in typhoid fever was presumably of a muscular origin, while elevation of liver enzyme was relatively less common. This study was performed on 30 female patients diagnosed by ultrasound (US) of abdomen, with paratyphoid A, ranged between (20-40) years compared with 30 healthy control .Patients volunteers were treated with appropriate antibiotics for 14 days and investigations were repeated 2-3 week after completion of treatment. Patients had clinical and biochemical evidence of hepatic dysfunction. The spectrum of hepatic involvement included hepatomegaly , jaundice, derangement of various hepatic func
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreCloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show More