As a well-known oral and intravenous antifungal, voriconazole (VRN) has an extensive history of usage in the medical field. Solid lipid nanoparticles (SLNs) have been produced to treat ocular fungal keratitis in the eye. A 32Box-behnken design was used to produce a variety of new formulas for hot-melt extrusion. The SLNs were evaluated by entrapment efficiency (EE percent), particle size (PS), polydispersity index (PDI), and zeta potential (ZP). A series of in-vitro and in-vivo studies were carried out on the new formula. The produced vesicles’ EE, PS, PDI, and ZP values were all good. SLNs eye drops were numerically adjusted to include carbopol, a stabilizer, lipids, and a surfactant, among other substances. ZP of -36.5 ± 0.20 mV, 80.9 ± 1.02 % EE, 205 ± 9.1 nm PS, and 0.015 PDI were all included in the data. For example, by differential scanning calorimetry (DSC) and fourier-transform infrared (FTIR), it was discovered that the crystallinity of the drug had been reduced. The in-vitro release study and the SLNs and carbopol-based eye drops prepared with ultrasonication method demonstrated sustained release up to 48 hours. Comparing VRN-SLNs pharmacokinetics to that of pure drug solution, researchers discovered an area under the curve (AUC) and Cmax three times higher and a factor of five times higher, respectively (both P 0.01). By functioning as a carrier, SLNs may increase the bioavailability of VRN in the eye. The in-vivo studies were performed by infecting the rats with candida species. It was observed that VRN-loaded SLNs eye drops were more efficient in treating candidiasis. Results indicate that VRN-loaded SLNs eye drops provide a sustaining VRN topical effect and quick relief from fungal infection.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreAbstract:-
The title of the thesis (TAQWA "Piety", TAWAKKUL "Trusting” AND NIYYAH "Intention" ARE AMONG THE FACTORS OF ADJUSTMENT) is related to the first legislative source of Islam, the Qur’an, and highlights the positive effects while adhering to the teachings of Islamic Sharia in terms of its importance in building the individual and thus society.
In this study, the researcher follows the objective approach, which includes collecting verses that refer to the issue of piety, trust and intention, and studying the verses objectively according to the sources, language books, ethics, and so on.
I sought to give each topic important headings, then study the topic and clarify it in general, based on narrations an
... Show MoreArum maculatum is traditionally used for the control of many diseases and illnesses such as kidney pain, liver injury, hemorrhoids. However, the detailed biomedical knowledge about this species is still lacking. This study reports on the bioactive components and the possible mechanisms underlying the antioxidant, anti-inflammatory and cytotoxic activity of A. maculatum leaf extract. Gas chromatography-mass spectrometry (GC-MS) was used for phytochemical analysis. Assay of 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide ) (MTT) was used to determine the cytotoxicity in the murine cell line L20B upon exposure to different extract concentrations for 24 h. Enzyme-linked immunosorbent assay (ELISA) was used to detect pro-in
... Show MoreObjective Tea lovers are increasing worldwide. We hope that this report is the first to discuss the possible impacts of high black tea consumption on gestational weight gain (GWG) and birth parameters. Methods Throughout one year, a total of 7,063 pregnant ladies coming for first antenatal visit were screened in a major tertiary center. Of them, 1,138 were involved and divided according to their preference into 3 groups: excessive tea (ET), usual tea (UT), and mixed beverages group. The study included women who gave birth to healthy neonates. Results The rate of ET consumption was 4.13% with a total of 41 cases. The UT group (controls) comprised 94 women. ET was significantly associated (P<0.05) with maternal age, parity, occupation, smokin
... Show MoreIn this study, the response of ten composite post-tensioned concrete beams topped by a reinforced concrete deck with adequate reinforcing shear connectors is investigated. Depending on the concrete compressive strength of the deck slab (20, 30, and 40 MPa), beams are grouped into three categories. Seven of these beams are exposed to a fire attack of 700 and 800 °C temperature simultaneously with or without the presence of a uniformly distributed sustained static loading. After cooling back to ambient temperature, these composite beams are loaded up to failure, using a force control module, by monotonic static loading in a four-point-bending setup with two symmetrical concentrated loads applied in
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w
... Show MoreThe current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .