Preferred Language
Articles
/
bijps-514
Bioequivalence of Two Formulations of Amoxicillin in Human Healthy Volunteers on (HPLC) Technique
...Show More Authors

Amoxicillin is commercially available in the form of capsules and tablets containing 250mg or 500mg for oral administration. It is also available in the form of suspension containing "25mg/ml” . Amoxicillin is presently used as the most common antibiotics .Ten healthy Human volunteers were characterized respected to their pharmacokinetic and bioavailability of two formulations of Amoxicillin from two sources of  industrial companies  after a single dose administration was given orally. A procedure is described for determination the concentration levels of Amoxicillin in human plasma of healthy volunteers using high performance liquid chromatography (HPLC) with reversed-phase isocratic column at low wave length of UV-visible detection "230nm". An efficient drug extraction procedure was used for the separation of Amoxicillin after simple extraction with cold methanol using ODS-C18-DB column. The pharmacokinetic 500mg of Amoxicillin capsule orally administrated treatment through 10 hours  has been examined.  The  Amoxicillin  was eluted  for "10.0 minutes" at flow Rate "1.5ml/min." and Temperature equal to 298 K .The retention time of Amoxicillin was observed at 7.0 minutes. The mean absolute recovery of Amoxicillin in blood plasma of all healthy volunteers were 94.1% at 1.0ppm, 102% at 5.0ppm, 103% at 10.0ppm 102% at 20ppm, 99.3% at 40ppm and 104% at 50ppm respectively. The assay showed excellent relationships between area under the curve ratios and drug concentration levels (P>0.002) .Oral Amoxicillin administration in ten healthy volunteers gave maximum concentration peak plasma at two hours and decline through ten hours. Treatment with Iraqi formulation Amoxicillin produced higher area under the curve “AUC” and maximum concentration “C (max)” of Amoxicillin than Indian formulation.

Key word: Amoxicillin, Bioequivalence, ODS -DB column.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iec2017 Proceedings Book
Improving TF-IDF with Singular Value Decomposition (SVD) for Feature Extraction on Twitter
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Big-data Management using Map Reduce on Cloud: Case study, EEG Images' Data
...Show More Authors

Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measurement and accounting disclosure for small and medium-sized enterprises according to the International Financial Reporting Standard (SMEs) and its reflection on the fairness of financial statements.
...Show More Authors

The research aims to identify small and medium enterprises in accounting thought in terms of definition and concept, and this international financial reporting standard for small and medium-sized enterprises (SMEs) in the theoretical aspect. As for the practical aspect, the small and medium-sized enterprises standard has been applied to the financial statements of the company in question, the preparation of the opening entry on the date of the transition, the requirements of measurement and the accounting disclosure on the date following the application of the standard, and the preparation of the company's financial statements and the accompanying explanations according to the standard of small and medium-sized enterprises. The r

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Synthesis, characterization and spectroscopic studies on Schiff base complexes of 1-phenyl-2, 3-dimethyl-4-amino-5-oxo-pyrazole with salicylaldehyde with some divalent transition metals
...Show More Authors

In this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Investment portfolio risks of the insurance company and their impacts on profitability ratios: An applied research at the national insurance co. for the period 2004-2014
...Show More Authors

The research is trying to identify the investment portfolio risks of the insurance company and their impact, on the Profitability ratios of the company, and whether the company's scientific methods followed in the measurement of these risks, and conducted research in the National Insurance Company. by relying on its annual budget as well as the annual reports, The search dealing with these data in theoretical and practical major premise to statistically significant between to investment portfolio risk and financial performance correlation and reach a set of conclusions and recommendations which are the following.                

investments include many ri

... Show More
View Publication Preview PDF
Crossref