Preferred Language
Articles
/
MhcQjJIBVTCNdQwC0LVz
SOLUPLUS AND SOLUTOL HS-15 OLMESARTAN MEDOXOMIL NANOMICELLE BASED ORAL FAST DISSOLVING FILM: IN VITRO AND IN VIVO CHARACTERIZATION
...Show More Authors

Olmesartan medoxomil (OM) has low bioavailability and limited solubility. To enhance bioavailability, fast dissolving films (FDF) with mixed micelles of soluplus (SPL) and solutol HS15 (STL H15) were developed using solvent casting. The optimised formula, FM2, used polyvinyl alcohol (PVA) and showed high entrapment efficiency, rapid disintegration, and significant improvement in OM bioavailability compared to the market tablet (Olmetec®). FM2 also demonstrated stability and potential for enhanced drug delivery.

Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Chemical Engineering Research And Design
Ternary glycerol-based deep eutectic solvents: Physicochemical properties and enzymatic activity
...Show More Authors

The present study investigates deep eutectic solvents (DESs) as potential media for enzymatic hydrolysis. A series of ternary ammonium and phosphonium-based DESs were prepared at different molar ratios by mixing with aqueous glycerol (85%). The physicochemical properties including surface tension, conductivity, density, and viscosity were measured at a temperature range of 298.15 K – 363.15 K. The eutectic points were highly influenced by the variation of temperature. The eutectic point of the choline chloride: glycerol: water (ratio of 1: 2.55: 2.28) and methyltriphenylphosphonium bromide:glycerol:water (ratio of 1: 4.25: 3.75) is 213.4 K and 255.8 K, respectively. The stability of the lipase enzyme isolated from porcine pancreas (PPL) a

... Show More
View Publication
Crossref (20)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Geoarabia
Sedimentological characterization of the mid-Cretaceous Mishrif reservoir in southern Mesopotamian Basin, Iraq
...Show More Authors
ABSTRACT<p>The CenomanianÐEarly Turonian reservoirs of the Mishrif Formation of the Mesopotamian Basin hold more than one-third of the proven Iraqi oil reserves. Difficulty in predicting the presence of these mostly rudistic reservoir units is mainly due to the complex paleogeography of the Mishrif depositional basin, which has not been helped by numerous previous studies using differing facies schemes over local areas. Here we present a regional microfacies-based study that incorporates earlier data into a comprehensive facies model. This shows that extensive accumulation of rudist banks usually occurred along an exterior shelf margin of the basin along an axis that runs from Hamrin to Badra a</p> ... Show More
View Publication
Scopus (143)
Crossref (91)
Scopus Crossref
Publication Date
Mon Nov 14 2022
Journal Name
Biomedicine
Molecular characterization of HBB gene mutations in beta-thalassemia patients of Southern Iraq
...Show More Authors

Introduction and Aim: Beta-thalassemia is a serious inherited genetic disorder and an increasing health burden globally. Beta -thalassemia is caused by genetic globin abnormalities within the hemoglobin beta (HBB) gene. This study aimed to characterize the HBB gene mutations in beta -thalassemia among southern Iraqi patients. Materials and Methods: The study included 30 beta -thalassemia patients referred to the Thi-Qar Center for Genetic Diseases, Iraq and 15 control samples from a random group of apparently healthy individuals. Genomic DNA was isolated from blood sample collected from each individual. The DNA was amplified for specific regions of the HBB gene and the amplified products sequenced. The sequences generated were analysed for

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 27 2012
Journal Name
Bmc Blood Disorders
Molecular characterization of glucose-6-phosphate dehydrogenase deficient variants in Baghdad city - Iraq
...Show More Authors
Abstract<sec><title>Background

Although G6PD deficiency is the most common genetically determined blood disorder among Iraqis, its molecular basis has only recently been studied among the Kurds in North Iraq, while studies focusing on Arabs in other parts of Iraq are still absent.

Methods

A total of 1810 apparently healthy adult male blood donors were randomly recruited from the national blood transfusion center in Baghdad. They were classified into G6PD deficient and non-deficient individuals based on the results of methemoglobin reduction test (MHRT), with confirmation of deficiency by subsequent enzyme assays. DNA from defi

... Show More
View Publication
Scopus (21)
Crossref (16)
Scopus Crossref
Publication Date
Thu Apr 29 2010
Journal Name
Journal Of The First Specialized National Conference In Chemistry 29-30 April 2010 University Of Thi-qar College Of Science
Preparation and Characterization of Mixed ligand complexes of Lanthanum (III) with 8- hydroxyqinoline and some amino acids
...Show More Authors