Introduction: Methadone hydrochloride (MDN) is an effective pharmacological substitution treatment for opioids dependence, adopted in different countries as methadone maintenance treatment (MMT) programmes. However, MDN can exacerbate the addiction problem if it is abused and injected intravenously, and the frequent visits to the MMT centres can reduce patient compliance. The overall aim of this study is to develop a novel extended-release capsule of MDN using the sol-gel silica (SGS) technique that has the potential to counteract medication-tampering techniques and associated health risks and reduce the frequent visits to MMT centres. Methods: For MDN recrystallisation, a closed container method (CCM) and hot-stage method (HSM) were conducted, and MDN crystals were characterised using the polarised light microscope (PLM). MDN crystal thickness was determined by scanning electron microscopy (SEM) and confocal microscopy (CM) to establish a relationship between MDN crystals thickness and their birefringence colours using the Michel-Levy Birefringence Colour Chart. The experimental series was continued to produce novel silica-based MDN formulations A and B capsules by adding MDN powder at the end and beginning of the SGS process, respectively. The silica-based MDN formulations were characterised by Fourier transform infrared (FT-IR), SEM, differential scanning calorimetry (DSC), thermogravimetric analysis (TGA), PLM and mean grey value (MGV) analyses. The in vitro release studies (n=3) for the silica-based MDN formulations and pure MDN capsules were conducted in a phosphate buffer solution (pH= 7.2) for 7 days. Stability studies were conducted for 1 month by keeping the silica-based MDN capsules under 25°C and 57% RH. Results: The optimal method to produce large numbers of MDN crystals was the CCM, and MDN crystals were characterised as diamond shaped with an intrinsic angle of 62o. The SEM surpassed the CM in measuring MDN crystal thickness, and Mann-Whitney U Test showed statistically significant differences between SEM and confocal thickness measurements (U= 1283, p < 0.05) as the SEM exhibited thinner diamond crystals (6.62 ± 2.9 µm) than the CM measurements (9.6 ± 4.6µm). According to the Michel-Levey birefringence colour chart (using the SEM mean thickness of MDN crystals and their retardation value of 428 nm), most of MDN crystals demonstrated a yellow colour. The FT-IR, SEM, DSC, MGV and PLM analyses of both silica-based MDN formulations revealed that MDN was successfully incorporated inside the silica network producing amorphous material (with no appearance of the melting peak of pure MDN at 233.4°C) with evidence of no physical or chemical interaction between sol-gel silica and MDN. However, the TGA analysis revealed a significantly greater amount of MDN was loaded inside the silica-based MDN formulation B compared to A (t = 2.80, p = 0.009, n=6), as 28.3 ± 0.6 mg of MDN was loaded in the former while 25.6 ± 0.7 mg in the latter. In addition, the silica-based MDN formulation B released 10% more MDN after 7 days than formulation A, and both formulations were stable when stored for 1 month under 57% RH and 25°C. Conclusion: The novel combined use of SEM and PLM techniques shows a potential for the identification of MDN in forensic science as it established a range of birefringence colours of MDN crystals. Moreover, the new silica-based MDN formulation B can help to deter MDN abuse and increase patient adherence to MMT due to its potential to sustain MDN release and reduce the frequent visits to MDN treatment centres.
Recently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show MoreSignificant advances in horizontal well drilling technology have been made in recent years. The conventional productivity equations for single phase flowing at steady state conditions have been used and solved using Microsoft Excel for various reservoir properties and different horizontal well lengths.
The deviation between the actual field data, and that obtained by the software based on conventional equations have been adjusted to introduce some parameters inserted in the conventional equation.
The new formula for calculating flow efficiency was derived and applied with the best proposed values of coefficients ψ=0.7 and ω= 1.4. The simulated results fitted the field data.
Various reservoir and field parameters including late
Abstract
The present investigation aimed to formulate a liquid self-microemulsifying drug delivery system (SMEDDS) of tacrolimus to enhance its oral bioavailability by improving its dispersibility and dissolution rate. Four liquid SMEDDS were prepared using maisine CC as oil phase, labrasol ALF as surfactant and transcutol HP as co-surfactant based on the solubility studies of tacrolimus in these components. The phase behavior of the components and the area of microemulsion were evaluated using pseudoternary phase diagrams. The formulations were also assessed for thermodynamic stability, robustness to dilution, self-emulsification time, drug content, globule size and polydispersity index. The prepared SMEDDS formulations exhibi
... Show MoreIn this paper, we have extracted Silica from rice husk ash (RHA) by sodium hydroxide to produce sodium silicate. 3-(chloropropyl)triethoxysilane (CPTES) functionalized with sodium silicate via a sol-gel method in one pot synthesis to prepare RHACCl. Chloro group in compound RHACCl replacement in iodo group to prepere RHACI. The FT-IR clearly showed absorption band of C-I at 580 cm-1. Functionalized silica RHACI has high surface area (410 m2/g) and average pore diameter (3.8 nm) within mesoporous range. X-ray diffraction pattern showed that functionalized silica RHACI has amorphous phase .Thermogravemitric analysis (TGA) showed two decomposition stages and SEM morphology of RHACI showed that the particles have irregu
... Show MoreThe pervaporation using a commercial hydrophilic ceramic membrane supplied from PERVATECH was conducted. The dehydration of ethanol/ water system was used as a model for the pervaporation study. Pervaporation experiments of ethanol/water system were carried out in the temperature range of 303-343K, ethanol concentration in the feed 10-90 vol. % and the feed flow rate in the range of 0.5-10 L/min. In this work, the effect of operation parameters on permeates fluxes as well as permeates separation factors have been studied. The Water flux is strongly dependent on the temperature; it increased with increasing in temperature, which in turn decreased the selectivity of membrane to water molecules.
In addition water flux was decr
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More