Preferred Language
Articles
/
alkej-426
Experimental Study of Drug Delivery system for Prednisolone Loaded and Released by Mesoporous Silica MCM-41
...Show More Authors

In the present study, nanoporous material type MCM-41 was prepared by the sol-gel technique and was used as a carrier for prednisolone (PRD) drug delivery. The structural properties of mesoporous were fully characterized by X-ray diffraction (XRD), N2 adsorption /desorption and Fourier-transform infrared (FTIR). The mass transfer in term of adsorption process (loading) and desorption process (releasing) properties were investigated. The maximum drug loading efficiency was equal to 38% and 47.5% at different concentrations. The PRD released was prudently studied in water media of pH 6.8 simulated body fluid (SBF) in according to "United State Pharmacopeia (USP38)". The results proved that the release of prednisolone from MCM-41 was (69.4%) after 24 hr. The data of the released PRD was found to be submitted to a Korsmeyer–Peppas model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Insights of Experienced Pharmacists Regarding the Iraqi health Insurance Program: A Qualitative Study(Conference Paper )#
...Show More Authors

The aim of study was to explore pharmacist insights toward the impact of prospective implementation of the national health insurance program on patients, providers and Iraqi health system.

This was a qualitative study including semi-structured face-to-face (mostly) interviews with experienced pharmacists. The interview guide included open-ended questions about the impact of the national health insurance program on patients and healthcare providers at three levels: quality of services, costs, and frequency of visits. Potential challenges were also discussed. Interviews were conducted in four provinces from March to May 2022. Thematic analysis was used to analyze the interview findings and generate themes and subthemes.

The

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Procedia Economics And Finance
Impact of Information Technology Infrastructure on Innovation Performance: An Empirical Study on Private Universities In Iraq
...Show More Authors

View Publication Preview PDF
Crossref (48)
Clarivate Crossref
Publication Date
Fri Dec 23 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Exploring the Capability of the Hospital Pharmacists in Conducting Pharmacy Practice Research: A Study from Malaysia
...Show More Authors

The engagement of pharmacists in research activities is pivotal in the advancement of the pharmacy practice. The study aims to evaluate the confidence and competence of Malaysian hospital pharmacists in conducting clinical and practice-based research.

A cross-sectional study was carried out between September 2019 and April 2020 using an online survey. Pharmacists from eight different hospitals in Malaysia were involved in the study. The survey link was sent to all pharmacists of the included hospitals via email. Data were analysed using SPSS version 25.

A total of 226 pharmacists participated in this study, and their average age was 28 years old. About 82 % of the participants reported that they did not have any previous re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Revealing the potentials of 3D modelling techniques; a comparison study towards data fusion from hybrid sensors
...Show More Authors
Abstract<p>The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Robust Estimation For Location Parameter
...Show More Authors

 In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design &amp; Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
Construction Bullying scale for Kindergarten child
...Show More Authors

Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF