Preferred Language
Articles
/
bijps-1086
Synthesis and evaluation of B-cyclodextrin Based Nanosponges of 5- Fluorouracil by Using Ultrasound Assisted Method
...Show More Authors

 

CD-nanosponges were prepared by crosslinking B-CD with diphenylcarbonate (DPC) using ultrasound assisted technique. 5-FU was incorporated with NS by freeze drying, and the phase solubility study, complexation efficiency (CE) entrapment efficiency were performed. Also, the particle morphology was studied using SEM and AFM. The in-vitro release of 5-FU from the prepared nanosponges was carried out in 0.1N HCl.

5-FU nanosponges particle size was in the nano size. The optimum formula showed a particle size of (405.46±30) nm, with a polydispersity index (PDI) (0.328±0.002) and a negative zeta potential (-18.75±1.8). Also the drug entrapment efficiency varied with the CD: DPC molar ratio from 15.6 % to 30%. The SEM and AFM showed crystalline and porous nature of the nanosponges. The in vitro drug release study of the selected formula 5-FUNS2 exhibited the fastest dissolution rate which is 56% in the first hr.

Different molar ratios of (cyclodextrin to crosslinker) (CD: DPC) has a proficient effect on complexation efficiency (CE), apparent stability constant (Kst) and entrapment efficiency of 5-FU. 5-FUNS2 with (1:4) molar ratio showed the best result of CE, Kst and entrapment efficiency. 5-FUNS2 gave a higher release rate than the 5-FU-BCD inclusion complex and 5-FU solution. Surface morphology of the prepared nanosponges by SEM, AFM indicate that nanosized and highly porous nanosponges was obtained. The overall results suggest that cyclodextrin nanosponges could be a promising 5-FU delivery system utilizing the suitable formula.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 11 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Elimination of the broadening in X-ray diffraction lines profile for nanoparticles by using the analysis of diffraction lines method
...Show More Authors

In this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Sep 02 2023
Journal Name
Second International Conference On Innovations In Software Architecture And Computational Systems (isacs 2022)
Synthesis and characterization of SAPO-11 using carbon nanotubes
...Show More Authors

The thermal method was used to produce silicoaluminophosphate (SAPO-11) with different amounts of carbon nanotubes (CNT). XRD, nitrogen adsorption-desorption, SEM, AFM, and FTIR were used to characterize the prepared catalyst. It was discovered that adding CNT increased the crystallinity of the synthesize SAPO-11 at all the temperatures which studied, wile the maximum surface area was 179.54 m2/g obtained at 190°C with 7.5 percent of CNT with a pore volume of 0.317 cm3/g ,and with nano-particles with average particle diameter of 24.8 nm, while the final molar composition of the prepared SAPO-11 was (Al2O3:0.93P2O5:0.414SiO2).

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 06 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Corticotomy assisted orthodontic canine retraction
...Show More Authors

Background: Surgical injury to alveolar bone can temporarily accelerate tooth movement by increasing the remodeling rate of alveolar bone. The purpose of this study was to clinically evaluate maxillary canine retraction acceleration with corticotomy-facilitated orthodontics, and its effect on vitality of pulp and gingival sulcus depth. Materials and method: The sample consisted of 12 adult patients (4 males, 8 females; mean age, 21.7 years) requiring the therapeutic extraction of the maxillary first premolars, with subsequent retraction of the maxillary canines. Surgical holes were done mesially and distally to the side with more space between canine and second premolar, and the other side served as the control. Canine retraction was done

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Synthesis of some polyimides by different methods
...Show More Authors

in this work the polymides were prepared as rthemally stable polymers by diffrent ways

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 06 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis, Characterization And Biological Evaluation of Schiff Base And Ligand Metal Complexes of Some Drug Substances
...Show More Authors

Synthesis, Characterization And Biological Evaluation of Schiff Base And Ligand Metal Complexes of Some Drug Substances

Publication Date
Fri Dec 01 2023
Journal Name
Food Bioscience
Green synthesis of silver nanomaterials and evaluation of their antibacterial and antioxidant effectiveness in chicken meat
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF