Preferred Language
Articles
/
bijps-362
Formulation and Evaluation of Ezetimibe Nanoparticles
...Show More Authors

The aim of this study is to formulate and evaluate ezetimibe nanoparticles using solvent antisolvent technology. Ezetimibe is a practically water-insoluble drug which acts as a lipid lowering drug that selectively inhibits the intestinal absorption of cholesterol and related phytosterols. Ezetimibe prepared as nano particles in order to improve its solubility and dissolution rate.

Thirty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-30), poly vinyl alcohol (PVA), hydroxy propyl methyl cellulose E5 (HPMC), and poloxamer. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 2, 1:3 and 1:4.

The prepared nanoparticles were evaluated for particle size, entrapment efficiency, dissolution study, Fourier transform infrared spectroscopy, differential scanning calorimetry, and atomic force microscopy. The percentage of drug entrapment efficiency of F1-F30 was ranged from 85% ± 1 to 98 % ± 1. On the other hand dissolution rate increasing as the particle surface area is increase due to reduction of particle size to the nano range.

The results showed that poly vinyl pyrrolidone (PVPK-30) was found to be the best stabilizer.

 Keywords: Ezetimibe, Nanoparticles, Particle Size, poly vinyl alcohol.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 05 2016
Journal Name
Al-academy
Formal unknown and its role in enriching the speech communication designs women's fabrics
...Show More Authors

The design fabrics of the most important episodes that are at the core process rhetorical communication, until they became these episodes ample room for research and investigation, and the issue of non-familiar formality is nothing but the result of those relationships Constructivism, which is the result of an effort builders coherent activate the shape and attributes of phenotypic, therefore it will cause him a lot of questions about his and founded the organization in order to activate the speech communication between the product(cloth)and the receiver .On this basis, the research problem identified on imposing the question follows:1. Does the non-familiar formal role in enriching communication discourse of women's fabric designs?2. Ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Consistency and Consistency in Contemporary Iraqi Painting - Selected Models-: حسين شاكر قاسم العيداني
...Show More Authors

  The tagged research is concerned with observation and investigating the concepts of consistency and harmony in contemporary Iraqi painting (selected models) in order to reveal the mechanisms and rules of these two concepts in the artistic field and their mechanisms of operation. How reflected tools Consistency and harmony in contemporary Iraqi painting? What is consistency and what are its mechanisms and principles? Is consistency a unit product quality? Are there similarities between consistency and harmony? What is harmony and its principles and rules? As for the second chapter, it included two topics that dealt with the first topic - consistency and harmony between concept and significance, while the second topic meant - histor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 08 2021
Journal Name
Proceedings Of International Conference On Emerging Technologies And Intelligent Systems
Drone Altitude Control Using Proportional Integral Derivative Technique and Recycled Carbon Fiber Structure
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Free Fatty Acids and Biochemical Changes in Iraqi patients with Chronic Renal Failure
...Show More Authors

Chronic renal failure (CRF) is progressive irreversible destruction of kidney tissue by disease which, if not treated by dialysis or transplant, will result in patient's death. This study was carried out on 30 patients (17 male and 13 female) with chronic renal failure. The aim of this research was studied the changes in the level of total protein ,albumin, calcium ,ionized calcium, phosphorous , iron ,ALP, LDH ,CK and FFA in patients with CRF before and after hemodialysis .The obtained results have been compared with 30 healthy subjects as control group (18male and 12 female). The results showed that there was significant increase in the level of calcium ,ionized calcium, phosphorous ,iron ,ALP,LDH,CK and FFA ,while there was a signifi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Personal tax exemptions "a comparative study with some Arab and European system legislations
...Show More Authors

This research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.      

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Semi E<sup>h</sup>-b-preinvexity and its applications to optimization problems
...Show More Authors
Abstract<p>In this paper, the class of semi <italic>E</italic> <sup> <italic>h</italic> </sup>-<italic>b</italic>-preinvex and pseudo <italic>E</italic> <sup> <italic>h</italic> </sup>-b-preinvex functions are defined as an extension of <italic>E-B</italic>-preinvex and <italic>h</italic>-preinvex functions. In this extension the functions <italic>E</italic>:ℝ<sup> <italic>n</italic> </sup> → ℝ<sup> </sup></p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Fabrication and Characterization CdO: In/Si Photovoltaic Solar Cell Prepard By Thermal Evaporation
...Show More Authors

Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref