Bromocriptine mesylate is a semisynthetic ergot alkaloid derivative with potent dopaminergic activity, used in the treatment of pituitary tumors, Parkinson's disease (PD), hyperprolactinaemia, neuroleptic malignant syndrome, and type 2 diabetes ,the oral bioavailability is approximately 6%, therefore aim its prepare and evaluate bromocriptine mesylate as liquid self nano emulsifying drug delivery system to enhance its solubility , dissolution and stability . Solubility study was made in different vehicles to select the best excipients for dissolving bromocriptine mesylate. Pseudo-ternary phase diagrams were constructed at 1:1, 2:1, 3:1 and 4:1 ratios of surfactant and co-surfactant, four formulations were prepared using various concentrations of castor oil, tween 80 and ethanol. All prepared formulations were evaluated for particle size distribution, polydispersity index, drug content, thermodynamic stability, dispersibility and emulsification time, robustness to dilution and in vitro drug dissolution. It was found that release rate and extent for all prepared formulations were significantly higher (p < 0.05) than plain drug powder. from the study, it was concluded that self-nanoemulsifying drug delivery system is a promising approach to improve solubility, dissolution, and stability of bromocriptine mesylate.
A new ligand [4-Methoxy -N-(pyrimidine-2-ylcarbamothioyl) benzamide] (MPB) was synthesized by reactioniofi(4-Methoxyibenzoyliisothiocyanate)withi(2-aminopyri-midine). The Ligand was characterized by elemental micro analysis (C.H.N.S),(FT-IR) (UV- Vis) and (1Hi,13CNMR)spectra. Some transition metals complexes of this ligand were prepared and characterized by (FT-IR, UV-Vis) spectra conductivity measurements magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all complexes was suggested to be [M(MPB)2Cl2] (M+2i=Cu, Mn, Co ,Ni ,Zn ,Cd and Hg),the proposed geometrical structure for all complexes was an octahedral.
Manganese dioxide rotating cylinder electrode prepared by anodic deposition on a graphite substrate using MnSO4 solution in the presence of 0.918 M of H2SO4. The influence of different operational parameters (MnSO4 concentration, current density, time, and rotation speed) on the structure, and morphology of MnO2 deposit film was examined widely. The structure and crystal size determined by X-ray diffraction (XRD), the morphology examined by scanning electron microscopy (SEM) and atomic force microscopy (AFM) techniques. The γ-MnO2 obtained as the main product of the deposition process. It found that the four parameters have a significant influence on the structure, morphology, and roughness of the prepared MnO2 deposit. The crystal size in
... Show MoreIn this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More