This study designed to prepare ultrafine apixaban (APX) o/w nanoemulsion (NE) based gel with droplet size below 50 nm as a good method for transdermal APX delivery without using permeation enhancer, alternatively, the formulation components itself act as permeation enhancer. APX, a potent oral anticoagulant drug that selectively and directly inhibit coagulation factor Xa, was selected as a good candidate for transdermal delivery as it displays poor water solubility (0.028 mg/mL) and low bioavailability (50%). APX-NE gel was prepared using triacetin, triton-x-100 and carbitol as oil phase, surfactant and cosurfactant respectively, while Carbopol 940 used as a gelling agent. Ex vivo permeation of APX-NE gel through human stratum corneum reveal
Production and characterization of methionine γ- lyase from Pseudomonas putida and its effect on cancer cell lines
M(II) Ions using amino acid L- proline as a primary ligand and either Nicotinamide or 8- hydroxyqinoline as secondary ligand, respectively: a. The mixed ligand complexes of composition,[M(pro)2(na)2]. b. The mixed ligand complexes of composition , Na[M(pro)2(Q)]. Where proline (C5H9NO2) symbolized as pro H , Nicotinamide (C6H6N2O) symbolized as (NA) , 8- hydroxyqinoline, (C9H7NO2) symbolized as (8-HQ). The ligands and the metal chlorides were brought into reaction at room temperature (37ºc) in ethanol as solvent .The reaction required the following molar ratios [(1:2:2) metal:2NA:2pro-] and [(1:1:2) metal:Q:2pro-] with M+2 ions, where M = [Mn (II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and pd(II)]. Products were found to be solid crystall
... Show MoreIn the present work, the phthalic acid (phthH2) and 1.10 phenonthroline (phen), and their complexes were synthesized and isolated as [M(phth)(phen)2], Mn(II), Fe(II), Co(II), Ni(II) Cu(II), Zn(II), and Cd(II) ions. These complexes were characterized by elemental analysis, melting point, conductivity, percentage metal, UV–Vis, FT-IR, and magnetic moment measurements. The molar conductance indicates that all the metal complexes in DMSO are nonelectrolytic. phthalic acid (phtha), and 1,10-Phenanthroline (phen), behaved as bidentate, coordinating to the metal ion through their two oxygen and two pyridinyl nitrogen atoms respectively, as corroborated by. Electronic spectra, FTIR, spectroscopy amusement indicated that all the metal complexes ad
... Show MoreGroundwater quality investigation has been carried out in the western part of Iraq (west longitude '40°40). The physicochemical analyses of 64 groundwater samples collected from seven aquifers were used in the determination of groundwater characterization and assessment. The concept of spatial hydrochemical bi-model was prepared for quantitative and qualitative interpretation. Hydrogeochemical data referred that the groundwater is of meteoric origin and has processes responsible for observed brackishness. The geochemical facies of the groundwater reveal that none of the anions and cations pairs exceed 50% and there are practically mixtures of multi-water types (such as Ca–Mg–Cl–HCO3 and Na+K–SO4–Cl water type) as do
... Show Moreالصيغة العامة للمعقدات الجديدة [M2(BDS)Cl4] الناتجة من تفاعل الليكاند الجديد] ن1,ن4-ثنائي(1أ –بنزو]د[ اميدازول-2-يل)-ن1,ن4-ثنائي(4-ثنائي مثيل امينو) بنزيل) سكسنمايد[ (BDS) مع الايونات الفلزية الكادميوم, الكوبلت, الزئبق, النحاس والنيكل. تم اشتقاق هذا الليكاند من تفاعل المواد الثلاث 4-(ثنائي ميثيل أمينو) بنزالدهيد، 2-أمينو بنزيميدازول، وكلوريد السكسينيل. تم تشخيص المركبات باستخدام مطيافية طيف الاشعة تحت الحمراء وطيف الرن
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called