Preferred Language
Articles
/
OheKNZIBVTCNdQwChqjd
A study on some variables affecting the preparation of ethyl cellulose based floating microspheres of lafutidine
...Show More Authors

Lafutidine (LAF) a newly developed histamine H2-receptor antagonist with absorption window makes it a good candidate to be prepared as floating drug delivery system. The current study involves formulation and in- Vitro evaluation of lafutidine as floating microspheres. Different formulation variables that affect the physicochemical properties of the prepared microspheres besides to the drug release behavior were investigated. Fourteen formulas were prepared by emulsion (o/w) solvent evaporation method using Ethyl cellulose (EC) as the polymeric matrix and tween 80 (TW80) as an emulsifying agent. The prepared formulas were evaluated for their percentage buoyancy (%), Percentage yield (%) and Entrapment efficiency (EE %). The results obtained by formulations were in the range of 64.5±1.885% to 96.8±1.22%, 70.4% to 86, 8% and 27±1.39% to 91.2±1.21% respectively. Formulas (FLF10 and FLF10A ) which prepared using 3:1 of EC : lafutidine ratio but with different stirring speed show desirable physicochemical properties and optimum, prolonged in vitro drug release profile and about 92.62% and 95.31% of drug dose release within 14 hrs respectively. It can be concluded that the floating microspheres of lafutidine can be made by emulsion solvent evaporation technique with good gastro retention ability and with expected better drug bioavailability

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
The effect of readings on the multiplicity of explanatory significance of a single Qur’anic word, a study through the interpretation of Ibn Attia al-Andalusi
...Show More Authors

The study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.

View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
RATIONALIZATION OF CONSUMPTION AND ITS IMPACT ON ECONOMIC DEVELOPMENT (A PRELIMINARY STUDY): RATIONALIZATION OF CONSUMPTION AND ITS IMPACT ON ECONOMIC DEVELOPMENT (A PRELIMINARY STUDY)
...Show More Authors

The research deals with the concept of rationalization of consumption, which is legitimately legitimized, by indicating the permissibility of consumption and its limits in Islam, the legitimate aspects of spending and its controls, and the concept of development in the Islamic economy. The researcher followed the descriptive method by presenting the legal texts and jurisprudential opinions and linking them to contemporary economic problems.The research has reached several conclusions, the most important of which is that the goal of Islam in relation to consumption is to inform the Muslim of the amount of economic maturity, and the truth of alms is good in money and religion. It is necessary for achieving maturity that both means

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study on the Physiological Function of a - Tocopherol, Vitamin (E) on Lipoproteins Levels in Serum of Apparantly Healthy Individuals
...Show More Authors

The  role  of  free  radicals  generation  and  Lipid  Peroxidation

during the course of ischemic heart disease is well establshed as a basic for Pthogenesis and subsequent tissue damage consequenes . In an attempt to shed a light on the possible relationship between lipid peroxidation and some antioxidant.

The effect of vitamine E  (as a potent antioxidant free radical scavenger) . On the serum levels of the Lipoproteins, (HDLc) High Density Lipoprotein , (LDLc) Low Density Lipoprotein and (VLDLc) very Low Density Lipoprotein in healthy donors.

The  study  includes  (50) healthy  donors  from  males  and  females  ,

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BIOLOGICAL ACTIVITY OF THE CAROTENOIDS WHICH ARE PRODUCED FROM LOCAL ISOLATE Rhodotorula mucilaginosa AND DETRERMINATION THE CONDITIONS AFFECTING THEIR STABILITY: BIOLOGICAL ACTIVITY OF THE CAROTENOIDS WHICH ARE PRODUCED FROM LOCAL ISOLATE Rhodotorula mucilaginosa AND DETRERMINATION THE CONDITIONS AFFECTING THEIR STABILITY
...Show More Authors

Biological activity of the carotenoids which are produced fromchemically-mutaed local isolate of Rhodotorula mucilaginosawas studied. The results showed variation of inhibition activity of caritenoids against different types of pathogenic bacteria include, Staph aureus, E. coli, B. subtilis and Salmo. typh., the number declined from 2×107cell/ml to 2×104, 5×104, 2×105, 9×105 cell/ml respectively after 24hour. The produced carotenoids from alocal mutant Rhodotorula mucilaginosa revealed an antioxidant activity as free radical removal of 85.6%. Carotinoides revealed a highest stability in petroleum ether solvent for 30 days at room temperature. It found that the pigment was more stability in sesame oil compared with sun flower and coc

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
A Comparative Study on Association Rule Mining Algorithms on the Hospital Infection Control Dataset
...Show More Authors

Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref