Preferred Language
Articles
/
OheKNZIBVTCNdQwChqjd
A study on some variables affecting the preparation of ethyl cellulose based floating microspheres of lafutidine
...Show More Authors

Lafutidine (LAF) a newly developed histamine H2-receptor antagonist with absorption window makes it a good candidate to be prepared as floating drug delivery system. The current study involves formulation and in- Vitro evaluation of lafutidine as floating microspheres. Different formulation variables that affect the physicochemical properties of the prepared microspheres besides to the drug release behavior were investigated. Fourteen formulas were prepared by emulsion (o/w) solvent evaporation method using Ethyl cellulose (EC) as the polymeric matrix and tween 80 (TW80) as an emulsifying agent. The prepared formulas were evaluated for their percentage buoyancy (%), Percentage yield (%) and Entrapment efficiency (EE %). The results obtained by formulations were in the range of 64.5±1.885% to 96.8±1.22%, 70.4% to 86, 8% and 27±1.39% to 91.2±1.21% respectively. Formulas (FLF10 and FLF10A ) which prepared using 3:1 of EC : lafutidine ratio but with different stirring speed show desirable physicochemical properties and optimum, prolonged in vitro drug release profile and about 92.62% and 95.31% of drug dose release within 14 hrs respectively. It can be concluded that the floating microspheres of lafutidine can be made by emulsion solvent evaporation technique with good gastro retention ability and with expected better drug bioavailability

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 15 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTRO
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTROL
...Show More Authors

Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2016
Journal Name
International Journal Of Applied Chemistry
Spectrophotometric Determination of Co(II) by Using Ethyl Cyano(2-Methyl Carboxylate Phenyl Azo Acetate) (ECA)
...Show More Authors

A new simple and sensitive spectrophotometric method for the determination of trace amount of Co(II) in the ethanol absolute solution have been developed. The method is based on the reaction of Co(II) with ethyl cyano(2-methyl carboxylate phenyl azo acetate) (ECA) in acid medium of hydrochloric acid (0.1 M) givining maximum absorbance at ((λmax = 656 nm). Beer's law is obeyed over the concentration range (5-60) (μg / ml) with molar absorptivity of (1.5263 × 103 L mol-1 cm-1) and correlation coefficient (0.9995). The precision (RSD% ˂ 1%). The stoichiometry of complex was confirmed by Job's method which indicated the ratio of metal to reagent is (2:1). The studied effect of interference elements Zn(II), Cu(II), Na(I), K(I), Ca(II) and Mg

... Show More
Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
Preparation of polyaniline polymer and using it as a Vapor sensor of acids
...Show More Authors

 Polyaniline organic Semiconductor polymer was prepared by oxidation polymerization by adding hydrochloric acid concentration of 0.1M and potassium per sulfate concentration of 0.2M to 0.1M of aniline at room temperature, the polymer was deposited at glass substrate, the structural and optical properties were studies through UV-VIS, IR, XRD measurements, films have been operated as a sensor of vapor  H2SO4 and HCl  acids.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The effect of context on some Quranic methods
...Show More Authors

Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani

... Show More
View Publication Preview PDF