In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with comparing without spacer unit.
Background: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.
The present study attempts to identify some of the differences between the skull bones of two species Cyprinus carpio and Carassius carassius, which belong to the Cyprinidae family. The study is a taxonomic diagnostic study between the two species which are considered local fish abundant in the Iraqi aquatic environment
The research aims to achieve proof of convergence between optimal costs and standard costs in calculating costs for the economic unit, support efforts aimed at adopting optimal costs in cost accounts and accounting thought in general, and achieve benefit from the theory of convergence between optimal costs and standard costs in the field of achieving actual costs in The economic unit in order to reduce and converge, and this came to address the possibility of adopting the concept of optimal costs in the production costs calculations for the purposes of rationalizing administrative decisions, and rationalizing the preparation of financial statements within management accounting.
The research concluded that
... Show MoreThis study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.
A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More