Bilosomes are nanocarriers that contain bile salts in their vesicular bilayer, thereby enhancing their flexibility and durability in the gastrointestinal tract. Unlike conventional vesicular systems they provide distinct advantages such as streamlined manufacturing procedures, cost efficiency, and improved stability. The main objective of this study was to attain a comparison of the pharmacokinetic parameters of nisoldipine (NSD) after administering an ordinary NSD suspension and an NSD-loaded bilosome suspension. The study used 60 Swiss albino rats weighing 200±15 g and divided into two groups (n=30 each). A dose of 2.2 mg/kg of NSD was administered from the ordinary NSD suspension to the rats of the first group and the same dose of NSD-loaded bilosome suspension was administered to the rats of the second group. NSD levels were determined in the rat plasma by using high-performance liquid chromatography. Our results showed that the Cmax, the Tmax, and the AUC0-36 were 51.47±0.94 ng/mL, 2±0.3 h, and 323.33±21 ng×h/mL for the pure suspension, and 116.41±1.22 ng/mL, 4±0.7 h, and 916±64.09 ng×h/mL for the bilosome suspension, respectively. The maximum concentration was significantly different between the pure and the bilosomal preparation (P<0.05), while the relative bioavailability of the pure suspension was 2.9 times that of the bilosomal suspension, 36 h after a single-dose NSD administration. In conclusion, the prepared bilosomal suspension enhanced the bioavaila¬bility of NSD, and could be considered as a vital delivery system.
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
This study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Introduction and Aim: Diabetes mellitus patients almost always struggle with a metabolic condition known as chronic hyperglycemia. According to the World Health Organization, osteoporosis is a progressive systemic skeletal disorder that is characterized by decreasing bone mass and microstructural breakdown of bone tissue that increases susceptibility to fracture and increased risk of breaking a bone. Here, we aimed to compare the levels of CatK and total oxidative state in patients with diabetes and osteoporosis among the female Iraqi population and study the possible relationship between them. Materials and Methods: This study included 40 females with diabetes (Group G1), 40 with diabetes and osteoporosis (Group G2) and 40 normal healthy f
... Show More