Preferred Language
Articles
/
bsj-1038
Study of the Porosity of Certain pharmaceutical Tablets using Mercury Intrusion Porosimeter
...Show More Authors

Porosity and pore structure are important characteristics of pharmaceutical tablets, since they influence the physical properties, such as mechanical strength, density and disintegration time. This paper is an attempt to investigate the pore structure of four different paracetamol tablets based on mercury porosimetry. The intrusion volumes of mercury were used to calculate the pore diameter, pore volume and pore size distribution. The result obtained indicate that the variation of the pore volume in the tablets followed the sequence:- S.D.I. Iraq? Pharmacare,Dubai-U.A.E.? Bron and Burk(UK) London?Lark Laboratories(India), while the variation of surface area followed the sequence:- S.D.I. Iraq? Lark Laboratories(India)? Pharmacare,Dubai-U.A.E. ? Bron and Burk(UK) London

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Cuneiform Tablets Image Preprocessing Proposed Algorithms Techniques for Pattern Recognition
...Show More Authors

Cuneiform symbols recognition represents a complicated task in pattern recognition  and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 21 2024
Journal Name
Sciences Journal Of Physical Education
The Contribution of Certain Physical Abilities to the Selection of Athletes for the 110m Hurdle Race (Youth Class)
...Show More Authors

View Publication
Publication Date
Thu Jun 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Development and Characterization of Controlled Release Tablets of Candesartan Cilexetil/ β‑Cyclodextrin Inclusion Complex
...Show More Authors

Objective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Development and Characterization of Controlled Release Tablets of Candesartan Cilexetil/ β‑Cyclodextrin Inclusion Complex
...Show More Authors

Objective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Generalization of Gamma and Beta Functions with Certain Properties and Statistical Application
...Show More Authors

     This work is devoted to define new generalized gamma and beta functions involving the recently suggested seven-parameter Mittag-Leffler function, followed by a review of all related special cases. In addition, necessary investigations are affirmed for the new generalized beta function, including, Mellin transform, differential formulas, integral representations, and essential summation relations. Furthermore, crucial statistical application has been realized for the new generalized beta function.  

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation, in vitro and ex-vivo Evaluation of Mirtazapine Nanosuspension and Nanoparticles Incorporated in Orodispersible Tablets
...Show More Authors

          The objective of the present investigation was to enhance the solubility of practically insoluble mirtazapine by preparing nanosuspension, prepared by using solvent anti solvent technology. Mirtazapine is practically insoluble in water which act as antidepressant .It was prepared as nano particles in order to improve its solubility and dissolution rate. Twenty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-90), poly vinyl alcohol (PVA), poloxamer 188 and poloxamer 407. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 1 and 1:2. The prepared nanoparticles were evaluated for

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (5)
Scopus Crossref