Nebivolol (NBH) is a third-generation B1-blocker with high selectivity and vasodilation activity. Nevertheless, nebivolol exhibits low oral bioavailability, which may adversely affect its efficacy. Recently, supersaturable self-nanoemulsion (Su-SNE) is an advanced SNE approach that can address low bioavailability The study aims to prepare nebivolol-loaded Su-SNE by reduction the amount of the prepared conventional SNE to half. Besides, an appropriate polymer type and concentration to prevent NBH precipitation upon oral administration have investigated.. A conventional self-nanoemulsion (formula A) was prepared by dissolving NBH in 500 mg vehicle mixture of imwitor®988: cremophor-EL: propylene glycol. Then, eight Su-SNE formulas with the absence or presence of four different polymers were prepared and evaluated. In-vitro precipitation assay was performed to assess the precipitation inhibition capacity of polymers. The ex-vivo permeation through rat intestinal mucosa was also conducted for determination of permeability parameters. Results revealed that (Su-SNA formula SAS1) containing 5% soluplus could effectively retard the nebivolol precipitation. There was no statistical difference between formula A and SAS1; both maintained a higher apparent NBH concentration for approximately 240 min in 0.1N HCl. The permeation rate of conventional (formula A) and soluplus-based Su-SNE (formula SAS1) was significantly improved, and the permeation enhancement ratio was found 2.7 and 3.2, respectively, as compared with non-formulated NBH. Consequently, it is concluded that developing soluplus-based nebivolol SNE is a promising alternative approach. It can enhance nebivolol stability and permeability with half the amount of conventional SNE components.
Permeability is one of the essential petrophysical properties of rocks, reflecting the rock's ability to pass fluids. It is considered the basis for building any model to predict well deliverability. Yamama formation carbonate rocks are distinguished by sedimentary cycles that separate formation into reservoir units and insulating layers, a very complex porous system caused by secondary porosity due to substitute and dissolution processes. Those factors create permeability variables and vary significantly. Three ways used for permeability calculation, the firstly was the classical method, which only related the permeability to the porosity, resulting in a weak relationship. Secondly, the flow zone indicator (FZI) was divided reservoir into
... Show MoreAn experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
DNA, as the basis of every living cell, is one of the most important and influential scientific discoveries. This research aims to identify and compare the organizational DNA to the leadership practices of school principals in the Sultanate of Oman and to reveal the similarity between principals’ leadership practices and the structure of DNA. In addition, it intends to identify any statistically significant differences between the responses of the participants due to the study variables: gender, job title and experience. A questionnaire was designed and data were collected from a randomly selected sample composed of (100) teachers in the Sultanate of Oman. The study found limitless diversity in the characteristics of DNA of leadership
... Show MoreShatt al-Arab is the only navigational artery in Iraq, extending from the city of Qurna to its mouth in the Arabian Gulf at the city of Al-Fao within the governorate of Basrah for a length of approximately 204 km. Its width ranges from 400 m to 2000 m, and its depth ranges from 8 m to 20 m. The southern part of it, 93 km long from Umm al-Rassas Island to Ras al-Bisha, represents the international border between Iraq and Iran, where the Thalweg line represents the border between the two countries, which is the deepest point in the riverbed (according to the 1975 Algiers Agreement). The western bank (the Iraqi side) within the common border of Shatt al-Arab is subject to continuous erosion, which leads to the shifting of t
... Show MoreThe application of physiological oxygen (physoxia) concentrations is becoming increasingly commonplace within a mammalian stem cell culture. Human mesenchymal stem cells (hMSCs) attract widespread interest for clinical application due to their unique immunomodulatory, multi-lineage potential, and regenerative capacities. Descriptions of the impact of physoxia on global DNA methylation patterns in hMSCs and the activity of enzymatic machinery responsible for its regulation remain limited. Human bone marrow-derived mesenchymal stem cells (BM-hMSCs, passage 1) isolated in reduced oxygen conditions displayed an upregulation of SOX2 in reduced oxygen conditions vs. air oxygen (21% O2, AO), while no change was noted for either OCT-4 or NA
... Show MoreIn this study, (50–110 nm) magnetic iron oxide (α-Fe2O3) nanoparticles were synthesized by pulsed laser ablation of iron target in dimethylformamide (DMF) and sodium dodecyl sulfate (SDS) solutions. The structural properties of the synthesized nanoparticles were investigated by using Fourier Transform Infrared (FT-IR) spectroscopy, UV–VIS absorption, scanning electron microscopy (SEM), atomic force microscopy (AFM), and X-ray diffraction (XRD). The effect of laser fluence on the characteristics of these nanoparticles was studied. Antibacterial activities of iron oxide nanoparticles were tested against Gram-positive; Staphylococcus aureus and Gram-negative; Escherichia coli, Pseudomonas aeruginosa and Serratia marcescens. The results sh
... Show MoreIn the present study, advanced oxidation treatment, the TiO2 /UV/H2O2 process was applied to decolorisation of the reactive yellow dyes in aqueous solution. The UV radiation was carried out with a 6 W low-pressure mercury lamp. The rate of color removal was studied by measuring the absorbency at a characteristic wavelength. The effects of H2O2 dosage, dye initial concentration and pH on decolorisation kinetics in the batch photoreactor were investigated. The highest decolorisation rates were observed (98.8) at pH range between 3 and 7. The optimal levels of H2O2 needed for the process were examined. It appears that high levels of H2O2 could reduce decolori
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More