Solubility problem of many of effective pharmaceutical molecules are still one of the major obstacle in theformulation of such molecules. Candesartan cilexetil (CC) is angiotensin II receptor antagonist with very low water solubility and this result in low and variable bioavailability. Self- emulsifying drug delivery system (SEDDS) showed promising result in overcoming solubility problem of many drug molecules. CC was prepared as SEDDS by using novel combination of two surfactants (tween 80 and cremophore EL) and tetraglycol as cosurfactant, in addition to the use of triacetin as oil. Different tests were performed in order to confirm the stability of the final product which includes thermodynamic study, determination of self-emulsification time, particle size and zeta potential measurement, and in-vitro drug release. The results showed that the particle size of the best formula was 13.3 nm and zeta potential of -37.45 mV with approximately 100% release after 45 minutes .These results suggest that the preparation of CC. as SEDDS with the use of the above combination of surfactant and cosurfactant is a promising maneuver for oral delivery of CC. in order to improve its bioavailability.
In this work, mesoporous silica SBA-15 was prepared and functionalized with amine groups (i.e., NH2) to form NH2/SBA-15. The curcumin (CUR) was encapsulated into the surface and pore of NH2/SBA-15 to create CUR@NH2/SBA-15 as an efficient carrier in drug delivery systems (DDSs). The three samples (i.e., SBA-15, NH2/SBA-15, and CUR@NH2/SBA-15) were characterized. The study investigated the effect of the carrier dose, initial CUR concentration, pH, and contact time on the CUR loading efficiency (DLE%) via adsorption. The best DLE% for the SBA-15 and NH2/SBA-15 were found to be 45% and 89.7%, respectively. The Langmuir isotherm had a greater correlation coefficient (R2) of 0.998 for SBA-15. A pseudo-secondorder kinetic model seemed to fit well
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreG-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the R
... Show MoreIn this paper we prove that the planar self-assembling micelle system
has no Liouvillian, polynomial and Darboux first integrals. Moreover, we show that the system
has only one irreducible Darboux polynomial with the cofactor being if and only if via the weight homogeneous polynomials and only two irreducible exponential factors and with cofactors and respectively with be the unique Darbox invariant of system.
A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe present work involved designing and synthesizing of a series of new. compounds which their molecules are composed from two biologically active components namely sulfamethoxazole or β-lactam containing drugs and cyclic imides. The target new compounds were synthesized by two steps in the first one a series of six bis (N-drug phthalamic acid_4-yl) ketone (1-6) were prepared from the reaction of sulfamethoxazole or β-lactam containing drugs with benzophenone 3, 3′, 4, 4′ -tetracarboxylic dianhydride.
In the second step, compounds (1-6) were introduced in dehydration reaction via fusion process producing the target compounds bis (N-drug phthalimidyl-4-yl) ketone (7-12). The antibacterial and antifungal high
... Show MoreHypertension is a major health problem throughout the world because of its high prevalence and its association with increased risk of cardiovascular diseases. It is defined as systolic blood pressure ≥ 140 mmHg and/or diastolic blood pressure ≥ 90 mmHg. The aim of this study was to compare the efficacy, safety and cardiovascular disease risk lowering ability, of three antihypertensive drug regimens.
A retrospective study was carried out on 66 hypertensive patients, divided in to three groups based on their antihypertensive drug regimens (ACE inhibitors, β-blockers treated and combination antihypertensive therapy, the combination therapy consist of two or more of the following antihypertensive drugs ACE inhibitor di
... Show MoreIn this paper the design of hybrid retina matching algorithm that is used in identification systems is considered. Retina based recognition is apparent as the most secure method for identification of an identity utilized to differentiate persons.
The characteristics of Speeded up Robust Feature (SURF) and Binary Robust Invariant Scalable Key-Points (BRISK) algorithm have been used in order to produce a fast matching algorithm than the classical ones, those characteristics are important for real-time applications which usually need quick processing of a growing quantity of data. The algorithm is divided into three stages: retinal image processing and segmentation, extracting the lo
... Show MoreIn this paper thermo-hydrodynamic characteristics were investigated experimentally for a new type shell-helical coiled tube heat exchanger used as a storage tank of closed loop solar water heater system. Triple concentric helical coils were made of copper tubes of (12.5mm OD and 10mm ID) with coils diameter of (207, 152.2, 97mm) for outer, middle and inner coils respectively. The experiments were carried out during a clear sky days of (March and April 2012). The parameters studied in this work are: history of average temperature of shell side of the storage tank, collector heat gain, heat rejected from coils to shell side of the storage tank, collector efficiency, thermal effectiveness of the heat exchanger (storage tank), and pressure d
... Show More