Background: Simvastatin (SIM) is a lipid-lowering agent to prevent disorders caused by clogged blood vessels. Because of its low solubility, it has low bioavailability. The adsorption technique is effective in improving drug solubility and dissolution rate. Objective: To use magnesium aluminum silicate (MAS) as an adsorbent in combination with Soluplus® as a hydrophilic polymer to formulate SIM as immediate-release tablets (IRTs). Methods: We used the solvent evaporation method to make MAS-loaded SIM in the presence of Soluplus®, making sure that the ratio of SIM to MAS to SOLU was 1:6:3. We then used this mixture to make IRTs. Using the direct compression method, we made all of the SIM-IRT formulas. We used diluents like Avicel®PH102, Avicel®PH101, and starch, as well as super disintegrants like Crospovidone (CP), Croscarmellose sodium (CCS), and sodium starch glycolate (SSG). We evaluated these formulas for their weight variation, hardness, friability, disintegration time, drug content, and dissolution profile. Results: We prepared the tablet formula (T5) using MAS-loaded SIM, Avicel®PH102 as a diluent, and CCS 3% as a super disintegrant. This formula showed the shortest disintegration time (0.61 min) and best drug release in phosphate buffer pH 7.0, releasing more than 80% of the drug within 30 minutes. Conclusion: Using suitable excipients, adsorption was an efficient method to enhance the solubility of SIM for preparation as IRTs.
Analysis the economic and financial phenomena and other requires to build the appropriate model, which represents the causal relations between factors. The operation building of the model depends on Imaging conditions and factors surrounding an in mathematical formula and the Researchers target to build that formula appropriately. Classical linear regression models are an important statistical tool, but used in a limited way, where is assumed that the relationship between the variables illustrations and response variables identifiable. To expand the representation of relationships between variables that represent the phenomenon under discussion we used Varying Coefficient Models
... Show MoreThis research studies the possibility of producing Bone China with available local and geological substitutes and other manufactured ones since it’s traditionally produced by Bone ash, Cornish stone, and China clay, while the substitutes are Kaolin instead of China clay and Feldspar potash instead of Cornish stone. Because of the unavailability of Feldspar in Iraq, it was substituted with the manufactured alternative Feldspar. Bone ash was prepared from cow bones with heating treatments, grinding and sifting. The alternative Feldspar was prepared by chemical analysis of the natural Feldspar potash with local materials that include Dwaikhla Kaolin, Urdhuma Silica sand, Potassium Carbonate, and Sodium Carbonate. The mixture was burned at
... Show MoreThe significant addition of immersive technologies, Virtual Reality (VR), Augmented Reality(AR) and Mixed Reality(MR) are transforming the domain of design education. Still, finding an equilibrium between these new tools alongside with traditional methods of teaching is a menace which educational institutes needs to solve. This paper proposes a structure that would help the ease with which to include immersive technologies within design education, keeping in mind the solid points of more conventional pedagogical methods. Based on a survey of interior design programs, this research highlights the potential for VR, AR and MR in student engagement, creativity skills and professional practices. The results suggest that adoption of an im
... Show MoreLanguage and politics go hand in hand and learning and comprehending political genre is to learn a language created for codifying, extending and transmitting political discourse in any text/talk. Drawing upon the theoretical framework of Fairclough’s CDA and Rhetoric, the current study aims at investigating Donald Trump’s First Speech, from the point of frequency and functions of some rhetorical strategies (Parallelism, Anaphora and the Power of Three, Antithesis and Expletive, etc.), Nominalization, Passivization, We-groups and Modality as well as Lexical and Textual Analysis, presented to the UN delivered on Sep. 19, 2017. Specifically, the study seeks to determine: (1) how President Trump succeeded in conveying his notions an
... Show MoreBackground: Diabetic neuropathy can affect any peripheral nerve, including sensory neurons, motor neurons, and the autonomic nervous system. Therefore, diabetic neuropathy has the potential to affect essentially any organ and can affect parts of the nervous system like the optic nerve, spinal cord, and brain. In addition, chronic hyperglycemia affects Schwann cells, and more severe patterns of diabetic neuropathy in humans involve demyelization. Schwann cell destruction might cause a number of changes in the axon. study aims to evaluate serum myelin protein level as a predicting marker in the diagnosis of diabetic neuropathy and to prevent early neuropathy complications of type 2 diabetes.
Sub
... Show MoreThe study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More