Objective: Carbamazepine is typically used for the treatment of seizure disorders and neuropathic pain. One of the major problems with this drug is its low solubility in water; therefore the objective of this study was to enhance the solubility of carbamazepine by complexation with cyclodextrin to be formulated as effervescent and dispersible granules.Methods: Solvent evaporation method was used to prepare, binary (Carbamazepine/β-cyclodextrin) complex and ternary (Carbamazepine/β-cyclodextrin/hydroxypropyl methyl cellulose (HPMC E5). The more soluble complex will be further formulated as unit dose effervescent and dispersible granules. The complexes were evaluated for their solubility, drug content, percentage practical yield and differential scanning calorimetery (DSC) to confirm the formation of the complex.Results: The ratio of effervescent components, amount of effervescent base, amount of croscarmellose sodium (superdisintegrant) within the formula were found to play a role in the percentage of drug dissolved. Among the all prepared formulas, the effervescent granules containing ternary complex equivalent to 200 or 100 carbamazepine with effervescent base of 1:2:3.4 citric acid: tartaric acid: sodium bicarbonate not less than 48% w/w and 3% w/w croscarmellose sodium within the formula may be considered as a promising formulas regarding the amount of drug dissolved within 5 min.Conclusion: The solubility of carbamazepine was enhanced by complexation with β-cyclodextrin and HPMC E5 as a ternary complex. Hence effervescent and dispersible granules of carbamazepine with good flow properties can be successfully prepared by using this complex.
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreThis study aims to evaluate drinking water quality at the Al Wahda plant (WTP) in Baghdad city. A conventional water treatment plant with an average flow rate of 72.82 MLD. Water samples were taken from the influent and effluent of the treatment plant and analyzed for some physicochemical and biological parameters during the period from June to November 2020. The results of the evaluation indicate that treated water has almost the same characteristics as raw water; in other terms, the plant units do not remove pollutants as efficiently as intended. Based on this, the station appears to be nothing more than a series of water passage units. However, apart from Total dissolved solids, the mean values of all parameters in the study were
... Show MoreThis study aims to evaluate drinking water quality at the Al Wahda plant (WTP) in Baghdad city. A conventional water treatment plant with an average flow rate of 72.82 MLD. Water samples were taken from the influent and effluent of the treatment plant and analyzed for some physicochemical and biological parameters during the period from June to November 2020. The results of the evaluation indicate that treated water has almost the same characteristics as raw water; in other terms, the plant units do not remove pollutants as efficiently as intended. Based on this, the station appears to be nothing more than a series of water passage units. However, apart from Total dissolved solids, the mean values of all parameters in th
... Show More