This research included the study of different factors that may effect on gatifloxacin stability (anew quinolone synthetic antibacterial agent) in its aqueous solution in order to develop and optimize the best delivary of the drug to the eye (as eye drop) with maximum local concentration and minimum systemic absorption and toxicity.Different formulas of gatifloxacin solution for ophthalmic use (0.3%)w/v were prepared in citrate, acetate,citrate/phosphate and phosphate buffers,their tonicity adjusted with suitable quantity of sodium chloride.The effect of different factors that might affectthe stability of gatifloxacin in its prepared ophthalmic solution was studied and determined spectrophotometrically at 287 nm. The results showed that The use of disodium edetate as asequestering agent gave more stable formula and gatifloxacin undergoes hydrolysis at low pH with optimum stability at pH 6.0, which is the most suitable pH for this ophthalmic solution. The type of buffer significantlyaffects on the rate of hydrolysis of gatifloxacinspecially at low pH and optimum stability was obtained by using phosphate buffer. The concentration of phosphate buffer had a significant effect on the hydrolysis of gatifloxacin and the rate of hydrolysis increased as the concentration buffer increased. Ionic strength affects the hydrolysis rate of gatifloxacin and the hydrolysis increased as the ionic strength increased. Light had a significant effect on the rate of hydrolysis of the drug and the drug losses 10% of its potency after 10 monthes of light exposure at room temperature. The prepared formula J ( gatifloxacin 0.3% in 0.1M phosphate buffer with sodium chloride 0.26% , xanthan gum 0.2% and disodium edetate 0.01%) is thebest stable one and had no irritation on the eye of experimental animals, and it passes successfully quality control tests including: drug content, pH, clarity and sterility test and comply with united state pharmacopoeia for ophthalmic solutions.
Hydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil at dif
... Show MoreTaxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,
... Show MoreThe study included a statement toxicity of some heavy metals individually and collectively and the existence of plant nutrients in the center Agirenk bluish green moss growth and Askhaddm biomass as an indicator of the study, in addition to portability moss on the accumulation of the metal
In recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.