Aceclofenac (AC) is an orally active phenyl acetic acid derivative, non-steroidal anti-inflammatory drug with exceptional anti-inflammatory, analgesic and antipyretic properties. It has low aqueous solubility, leading to slow dissolution, low permeability and inadequate bioavailability. The aim of the current study was to prepare and characterize AC-NS-based gel to enhance the dissolution rate and then percutaneous permeability. NS.s were prepared using solvent/antisovent precipitation method at different drug to polymer ratios (1:1, 1:2, and 1:3) using different polymers such as poly vinyl pyrrolidone (PVP-K25), hydroxy propyl methyl cellulose (HPMC-E5) and poloxamer® (388) as stabilizers alone and in combinations of two polymers (1:2 and 1:4 Drug: polymer ratio). Fifteen formulas of AC-NS.s were prepared and characterized for production yield, loading efficiency, particle size, polydispersity index and physical stability. The best formulas of NS were then lyophilized to be characterized by FTIR, DSC, P-XRD and SEM. After that, the best prepared formula of AC-NS regarding the involved characterization methods was incorporated in gel dosage forms using carbopol®940. From this study, we conclude that the dissolution rate and permeability of AC were improved when the particle size was reduced to Nano-scale as compared with pure drug.
Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer
... Show MoreThe Bartholin gland cyst is a condition that occurs in approximately 2% of women, most of whom are of reproductive age. Although benign pathology, it is associated with significant patient discomfort. This disorder is caused by the obstruction and consequent dilation of the cyst duct. Definitive treatment involves the surgical removal of the entire cyst. Other alternative treatments include Marsupialization, Word catheter, and the use of CO2 laser. CO2 laser can be used either to vaporize or to excise the Bartholin gland cyst. The Objectives: The purpose of the study was to evaluate the efficacy and safety of (10600nm) CO2 laser in the treatment of Bartholin gland cyst. Patients, Materials & Methods: This study was done in laser medi
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More