Introduction: Methadone hydrochloride (MDN) is an effective pharmacological substitution treatment for opioids dependence, adopted in different countries as methadone maintenance treatment (MMT) programmes. However, MDN can exacerbate the addiction problem if it is abused and injected intravenously, and the frequent visits to the MMT centres can reduce patient compliance. The overall aim of this study is to develop a novel extended-release capsule of MDN using the sol-gel silica (SGS) technique that has the potential to counteract medication-tampering techniques and associated health risks and reduce the frequent visits to MMT centres. Methods: For MDN recrystallisation, a closed container method (CCM) and hot-stage method (HSM) were conducted, and MDN crystals were characterised using the polarised light microscope (PLM). MDN crystal thickness was determined by scanning electron microscopy (SEM) and confocal microscopy (CM) to establish a relationship between MDN crystals thickness and their birefringence colours using the Michel-Levy Birefringence Colour Chart. The experimental series was continued to produce novel silica-based MDN formulations A and B capsules by adding MDN powder at the end and beginning of the SGS process, respectively. The silica-based MDN formulations were characterised by Fourier transform infrared (FT-IR), SEM, differential scanning calorimetry (DSC), thermogravimetric analysis (TGA), PLM and mean grey value (MGV) analyses. The in vitro release studies (n=3) for the silica-based MDN formulations and pure MDN capsules were conducted in a phosphate buffer solution (pH= 7.2) for 7 days. Stability studies were conducted for 1 month by keeping the silica-based MDN capsules under 25°C and 57% RH. Results: The optimal method to produce large numbers of MDN crystals was the CCM, and MDN crystals were characterised as diamond shaped with an intrinsic angle of 62o. The SEM surpassed the CM in measuring MDN crystal thickness, and Mann-Whitney U Test showed statistically significant differences between SEM and confocal thickness measurements (U= 1283, p < 0.05) as the SEM exhibited thinner diamond crystals (6.62 ± 2.9 µm) than the CM measurements (9.6 ± 4.6µm). According to the Michel-Levey birefringence colour chart (using the SEM mean thickness of MDN crystals and their retardation value of 428 nm), most of MDN crystals demonstrated a yellow colour. The FT-IR, SEM, DSC, MGV and PLM analyses of both silica-based MDN formulations revealed that MDN was successfully incorporated inside the silica network producing amorphous material (with no appearance of the melting peak of pure MDN at 233.4°C) with evidence of no physical or chemical interaction between sol-gel silica and MDN. However, the TGA analysis revealed a significantly greater amount of MDN was loaded inside the silica-based MDN formulation B compared to A (t = 2.80, p = 0.009, n=6), as 28.3 ± 0.6 mg of MDN was loaded in the former while 25.6 ± 0.7 mg in the latter. In addition, the silica-based MDN formulation B released 10% more MDN after 7 days than formulation A, and both formulations were stable when stored for 1 month under 57% RH and 25°C. Conclusion: The novel combined use of SEM and PLM techniques shows a potential for the identification of MDN in forensic science as it established a range of birefringence colours of MDN crystals. Moreover, the new silica-based MDN formulation B can help to deter MDN abuse and increase patient adherence to MMT due to its potential to sustain MDN release and reduce the frequent visits to MDN treatment centres.
This article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreKE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19
The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreThis work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreA multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MoreBackground: Nursing interventions tailored to the smoking triggers in patients with non-communicable chronic diseases are essential. However, these interventions are scant due to the nature of factors associated with smoking cessation and the poor understanding of the effect of nurse-led intervention in Iraq.Purpose: This study aimed to determine the dominant smoking triggers and examine the effects of a tailored nursing intervention on smoking behavior in patients with non-communicable chronic diseases.Methods: Convenience samples of 128 patients with non-communicable chronic diseases, male and female patients, who were 18-70 years old, were recruited in this quasi-experimental, randomized comparative trial in the outpatient clinic
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreCassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has
... Show More