Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's
... Show MoreUnmanned aerial vehicles (UAVs) can provide valuable spatial information products for many projects across a wide range of applications. One of the major challenges in this discipline is the quality of positioning accuracy of the resulting mapping products in professional photogrammetric projects. This is especially true when using low-cost UAV systems equipped with GNSS receivers for navigation. In this study, the influence of UAV flight direction and camera orientation on positioning accuracy in an urban area on the west bank of the Euphrates river in Iraq was investigated. Positioning accuracy was tested in this study with different flight directions and camera orientation settings using a UAV autopilot app (Pix4Dcapture software
... Show MoreThe present study is to formulate and evaluate Acyclovir (ACV) microspheres using natural polymers like chitosan and sodium alginate. ACV is a DNA polymerase inhibitor used in treating herpes simplex virus infection and zoster varicella infections. Acyclovir is a suitable candidate for sustained-release (SR) administration as a result of its dosage regimen twice or thrice a day and relatively short plasma half-life (approximately 2 to 4 hours). Microspheres of ACV were prepared by an ionic dilution method using chitosan and sodium alginate as polymers. The prepared ACV microspheres were then subjected to FTIR, SEM, particle size, % yield, entrapment efficiency, in vitro dissolution studies and release kinetics mechanism. The FTI
... Show MoreDrug nanocrystals are nanoscopic crystals of the parent compound with dimensions less than 1 µm. A decrease in particle size will lead to an increase in effective surface area in the diffusion layer, which, in turn, increases the drug dissolution rate. Drug nanocrystals are one of the most important strategies to enhance the oral bioavailability of hydrophobic drugs.
Cefixime is the first member of what is generally termed the third generation orally active cephalosporins. These third generation cephalosporins are distinct from the older β-lactam antibiotics in their intensive antibacterial activity against a wide range of gram-negative bacteria.
The aim of this study is to prepare nanocrystals of cefixime as a caps
... Show MoreThe aim of this study is to formulate and evaluate ezetimibe nanoparticles using solvent antisolvent technology. Ezetimibe is a practically water-insoluble drug which acts as a lipid lowering drug that selectively inhibits the intestinal absorption of cholesterol and related phytosterols. Ezetimibe prepared as nano particles in order to improve its solubility and dissolution rate.
Thirty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-30), poly vinyl alcohol (PVA), hydroxy propyl methyl cellulose E5 (HPMC), and poloxamer. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 2, 1:3 and 1:4.
The prepared nanoparticles
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreMost includeding techniques of digital watermark even now working through the direct inclusion in the pixel without taking into account the level of compression (attack) that can go wrong, which makes digital watermark can be discarded easily. In this research, a method was proposed to overcome this problem, which is based on DCT (after image partitioned into non overlapped blocks with size 8×8 pixel), accompanied by a quantization method. The watermark (digital image) is embedded in DCT frequency domain seeking the blocks have highest standard deviation (the checking is only on the AC coefficients) within a predetermined threshold value, then the covered image will compressed (attacked) varying degrees of compression. The suggested met
... Show MoreAlgorithms for Arabic stemming available in two main types which are root-based approach and stem-based approach. Both types have problems which have been solved in the proposed stemmer which combined rules of both main types and based on Arabic patterns (Tafealat1) to find the added letters. The proposed stemmer achieved root exploration ratio (99.08) and fault ratio (0.9).