Preferred Language
Articles
/
bijps-1543
Permeability Enhancement of Methotrexate Transdermal Gel using Eucalyptus oil, Peppermint Oil and Olive Oil(Conference Paper )#
...Show More Authors

Abstract

Objective: the idea of this study to improve transdermal permeability of Methotrexate using eucalyptus oil, olive oil and peppermint oil as enhancers.
Method: eucalyptus oil (2% and 4%), peppermint oil (2% and 4%) and olive oil (2% and 4%) all used as natural enhancers to develop transdermal permeability of Methotrexate via gel formulation. The gel was subjected to many physiochemical properties tests. In-vitro release and permeability studies for the drug were done by Franz cell diffusion across synthetic membrane, kinetic model was studied via korsmeyer- peppas equation.
Result: the results demonstrate that safe, nonirritant or cause necrosis to rats' skin and stable till 60 days gel was successfully formulated.
Methotrexate penetration alone without enhancer is only about 20%, while using enhancers reach to 85%, 99% and 90% with eucalyptus oil 4%, peppermint oil 4% and olive oil 4% respectively after 24 hours.
Conclusion: Methotrexate transdermal gel was prepared and evaluated fruitfully in-vitro with a good permeation across semipermeable membrane. The results indicated that using of peppermint oil as enhancer have superiority to enhance the transdermal permeation of the Methotrexate.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Reducing endotoxin from dialysis water by using different disinfection processes
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Neuroquantology
Evaluating Radon Level in Imported Milk Using CR-39 Detector
...Show More Authors

View Publication
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Iraqi Journal Of Laser
Spider Veins Treatment using 1064 nm Long-Pulse Nd:YAG Laser
...Show More Authors

spider veins are clusters of Ectatic venules & are common finding on the lower limbs generally believed to be caused by multiple factors, including genetic predisposition, hormonal factors, gravity, occupation, pregnancy, becoming increasingly apparent with age, and trauma. Therapeutic options include sclerotherapy, surgical procedures, and treatment with different laser systems.

 Objectives: The purpose of the study was to evaluate the efficacy and safety of long pulsed (Nd:YAG) laser emitting at 1064nm in the treatment of spider veins.

Patients, Materials and Methods: This prospective study was done in the laser medicine research clinics of the Institute of las

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 10 2026
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on

... Show More
View Publication
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The Iraqi Journal For Information And Documentation Studies
Improving students' cognitive abilities using modern technologies: an experimental study
...Show More Authors

The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Facial Emotion Recognition from Videos Using Deep Convolutional Neural Networks
...Show More Authors

Its well known that understanding human facial expressions is a key component in understanding emotions and finds broad applications in the field of human-computer interaction (HCI), has been a long-standing issue. In this paper, we shed light on the utilisation of a deep convolutional neural network (DCNN) for facial emotion recognition from videos using the TensorFlow machine-learning library from Google. This work was applied to ten emotions from the Amsterdam Dynamic Facial Expression Set-Bath Intensity Variations (ADFES-BIV) dataset and tested using two datasets.

View Publication Preview PDF
Scopus (57)
Crossref (40)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref