Bilosomes are nanocarriers that contain bile salts in their vesicular bilayer, thereby enhancing their flexibility and durability in the gastrointestinal tract. Unlike conventional vesicular systems they provide distinct advantages such as streamlined manufacturing procedures, cost efficiency, and improved stability. The main objective of this study was to attain a comparison of the pharmacokinetic parameters of nisoldipine (NSD) after administering an ordinary NSD suspension and an NSD-loaded bilosome suspension. The study used 60 Swiss albino rats weighing 200±15 g and divided into two groups (n=30 each). A dose of 2.2 mg/kg of NSD was administered from the ordinary NSD suspension to the rats of the first group and the same dose of NSD-loaded bilosome suspension was administered to the rats of the second group. NSD levels were determined in the rat plasma by using high-performance liquid chromatography. Our results showed that the Cmax, the Tmax, and the AUC0-36 were 51.47±0.94 ng/mL, 2±0.3 h, and 323.33±21 ng×h/mL for the pure suspension, and 116.41±1.22 ng/mL, 4±0.7 h, and 916±64.09 ng×h/mL for the bilosome suspension, respectively. The maximum concentration was significantly different between the pure and the bilosomal preparation (P<0.05), while the relative bioavailability of the pure suspension was 2.9 times that of the bilosomal suspension, 36 h after a single-dose NSD administration. In conclusion, the prepared bilosomal suspension enhanced the bioavaila¬bility of NSD, and could be considered as a vital delivery system.
A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.
In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes. Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo
... Show MoreIn this paper, a mathematical model was built for the supply chain to reduce production, inventory, and transportation in Baghdad Company for Soft Drink. The linear programming method was used to solve this mathematical model. We reduced the cost of production by reduced the daily work hours, the company do not need the overtime hours to work at the same levels of production, and the costs of storage in the company's warehouses and agents' stores have been reduced by making use of the stock correctly, which guarantees reducing costs and preserving products from damage. The units transferred from the company were equal to the units demanded by the agents. The company's mathematical model also achieved profits by (84,663,769) by re
... Show MoreUltraviolet photodetectors have been widely utilized in several applications, such as advanced communication, ozone sensing, air purification, flame detection, etc. Gallium nitride and its compound semiconductors have been promising candidates in photodetection applications. Unlike polar gallium nitride-based optoelectronics, non-polar gallium nitride-based optoelectronics have gained huge attention due to the piezoelectric and spontaneous polarization effect–induced quantum confined-stark effect being eliminated. In turn, non-polar gallium nitride-based photodetectors portray higher efficiency and faster response compared to the polar growth direction. To date, however, a systematic literature review of non-polar gallium nitride-
... Show MoreActive vibration control is the main problem in different structure. Smart material like piezoelectric make a structure smart, adaptive and self-controlling so, they are effective in active vibration control. In this paper piezoelectric elements are used as sensors and actuators in flexible structures for sensing and actuating purposes, and to control the vibration of a cantilever beam by using sliding mode control. The sliding mode controller (SMC) is designed to attenuate the vibration induced by initial tip displacement which is equal to 15 mm. It is designed based on the balance realization reduction method where three states are selected for the reduced model from the 24th states that describe the c
... Show Morefashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show More