Preferred Language
Articles
/
bijps-777
Novel Combination for Self-Nanoemulsifying Drug Delivery System of Candesartan Cilexetil
...Show More Authors

Solubility problem of many of effective pharmaceutical molecules are still one of the major obstacle in theformulation of such molecules. Candesartan cilexetil (CC) is angiotensin II receptor antagonist with very low water solubility and this result in low and variable bioavailability. Self- emulsifying drug delivery system (SEDDS) showed promising result in overcoming solubility problem of many drug molecules. CC was prepared as SEDDS by using novel combination of two surfactants (tween 80 and cremophore EL) and tetraglycol as cosurfactant, in addition to the use of triacetin as oil. Different tests were performed in order to confirm the stability of the final product which includes thermodynamic study, determination of self-emulsification time, particle size and zeta potential measurement, and in-vitro drug release. The results showed that the particle size of the best formula was 13.3 nm and zeta potential of -37.45 mV with approximately 100% release after 45 minutes .These results suggest that the preparation of CC. as SEDDS with the use of the above combination of surfactant and cosurfactant is a promising maneuver for oral delivery of CC. in order to improve its bioavailability.   

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of Molecular Imprinting on the Loading and Release of Poorly Water Soluble Drug in Hydrogel Gontact Lenses
...Show More Authors

Therapeutic contact lenses TCLs is an approach used to enhance corneal residence time and reduce frequent instillation, which is a problem with eye drops.  The problem with CLs is loading of hydrophobic drugs. In this research the CLs were prepared with molecular imprinting MI to enhance the loading of itraconazole, which is used as antifungal drug for fungal keratitis. CLs using different  concentration of hydroxyethyl methacrylate HEMA and methacrylic acid MAA were prepared with and without MI using PEGDA (25 μL) and AIBN (37 mg) as crosslinker and initiator respectively. All the prepared CLs were clear and have good folding endurance. MICLs had significantly higher drug loading compared to conventional CLs. The release of i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Understanding the Experience of Hospital Pharmacists with the Effectiveness, Safety, Adverse Drug Reaction Reporting and Interchangeability of Biopharmaceutical Medicines
...Show More Authors

The study objectives were to 1) explore the real-world experience of hospital pharmacists with the differences in effectiveness safety, and interchangeability between biosimilar medicines and their reference biological counterparts, 2) reveal pharmacist recommendations to enhance the safety of biopharmaceutical medicines in public hospitals.

The study has a mixed-method design where the core component was qualitative (interviews) and the supplemental component was quantitative (adverse drug reaction, ADR, reports). This qualitative component included semi-structured (mostly face-to-face) interviews involving hospital pharmacists from different hospitals with experience with biological or biosimilar medicines. The interviews were c

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 19 2023
Journal Name
Plos One
Knowledge sharing behaviour among head nurses in online health communities: The moderating role of knowledge self-efficacy
...Show More Authors
Background

Head nurses are vital in understanding and encouraging knowledge sharing among their followers. However, few empirical studies have highlighted their contribution to knowledge-sharing behaviour in Online Health Communities (OHCs). In addition, scant literature has examined the moderating role of knowledge self-efficacy in this regard.

Purposes

This study examines the moderating role of self-efficacy between the association of four selected individual factors of head nurses (i.e., Trust, Reciprocity, Reputation, and Ability to Share) and their knowledge-sharing behaviour in OHCs in Jordan.

<
... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
HandWritten Numerals Recognition System
...Show More Authors

  Recognition is one of the basic characteristics of human brain, and also for the living   creatures. It is possible to recognize images, persons, or patterns according to their characteristics. This recognition could be done using eyes or dedicated proposed methods. There are numerous applications for pattern recognition such as recognition of printed or handwritten letters, for example reading post addresses automatically and reading documents or check reading in bank.

      One of the challenges which faces researchers in character recognition field is the recognition of digits, which are written by hand. This paper describes a classification method for on-line handwrit

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Hisba system in Islam
...Show More Authors

 

Through research it shows that the calculation has an effective role in the maintenance of Islamic law and save. And that the calculation religious function to attach religious matters and it closeness to God, whether calculated or assumed carried out by volunteers. And scientists from the description of the calculation as a social function to attach to morality and kinship and charity to the poor and the dissemination of science. By definition it shows that the injury will not be exposed only to the evils of any phenomenon that do not break and was checking to search for evil, but he must intervene if he saw visible in front of him. And that of the areas that could see the calculation are the field of information and educ

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref