Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A.E. ? Bron and Burk(UK) London
An easy, eclectic, precise high-Performance Liquid Chromatographic (HPLC) procedure was evolved and validated to estimate of Piroxicam and Codeine phosphate. Chromatographic demarcation was accomplished on a C18 column [Use BDS Hypersil C18, 5μ, 150 x 4.6 mm] using a mobile phase of methanol: phosphate buffer (60:40, v/v, pH=2.3), the flow rate was 1.1 mL/min, UV detection was at 214 nm. System Suitability tests (SSTs) are typically performed to assess the suitability and effectiveness of the entire chromatography system. The retention time for Piroxicam was found to be 3.95 minutes and 1.46 minutes for Codeine phosphate. The evolved method has been validated through precision, limit of quantitation, specificity,
... Show MoreA simple, low cost and rapid flow injection turbidimetric method was developed and validated for mebeverine hydrochloride (MBH) determination in pharmaceutical preparations. The developed method is based on forming of a white, turbid ion-pair product as a result of a reaction between the MBH and sodium persulfate in a closed flow injection system where the sodium persulfate is used as precipitation reagent. The turbidity of the formed complex was measured at the detection angle of 180° (attenuated detection) using NAG dual&Solo (0-180°) detector which contained dual detections zones (i.e., measuring cells 1 & 2). The increase in the turbidity of the complex was directly proportional to the increase of the MBH concentration
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreKp index correlates with the many magnetosphere properties, which are used to measure the level of magnetic activity. In the solar system, the two different planets, Mercury with weak magnetic field and Jupiter with strong magnetic field, are selected for this study to calculate the planet's magnetosphere radius (RMP) which represents the size of magnetosphere compared with solar activity through Kp index, through two types of geomagnetic conditions; quiet and strong for the period (2016-2018). From the results, we found that there are reversible relations between them during strong geomagnetic storms, while there are direct relations during quiet geomagnetic conditions. Also it is found that the
... Show MoreThe objective of the present investigation was to enhance the solubility of practically insoluble mirtazapine by preparing nanosuspension, prepared by using solvent anti solvent technology. Mirtazapine is practically insoluble in water which act as antidepressant .It was prepared as nano particles in order to improve its solubility and dissolution rate. Twenty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-90), poly vinyl alcohol (PVA), poloxamer 188 and poloxamer 407. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 1 and 1:2. The prepared nanoparticles were evaluated for
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreMauddud Formation (Albian stage-the Early Cretaceous) is an important oil reservoir in Ratawi field of southern Iraq. Four wells, R T-2, R T-3, R T-6, and R T-7, located 70 km northwest of Basra, were selected to study microfacies properties and petrophysical associations with the probability of oil production. Seventy-seven core samples are collected, and thin sections for petrographic analysis. The self-potential, Gamma-ray, resistivity, and porosity logs are used to determine the top and bottom of the Mauddud Formation. Water saturation of the invaded and uninvaded zones, shale volume, and porosity were calculated. The study area results showed that the quantity of shale is less than 15% for most of the wells, and the dominant po
... Show MoreIn this paper, we study the growth of solutions of the second order linear complex differential equations insuring that any nontrivial solutions are of infinite order. It is assumed that the coefficients satisfy the extremal condition for Yang’s inequality and the extremal condition for Denjoy’s conjecture. The other condition is that one of the coefficients itself is a solution of the differential equation .
In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThe main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show More