In this work a novel drug delivery system through modification of poly acrylic acid with Methionine as a spacer between the poly acrylic acid which was converted to its acyl chloride and reacted with Methionine as spacer unit which has been reacted with Ampicillin drug. In vitro drug release study had been conducted successfully in basic medium in pH 7.4 and acidic medium in pH 1.1 at 37?. Due to many problems associated with drug release and, this modification could decrease the side effect of drug. The prepared prodrug polymer was characterized by spectra method [FTIR and 1H?NMR]. Physical properties and intrinsic viscosity of drug polymer were determined. The good results were obtained in the presence of spacer unit with comparing without spacer unit.
Communication has seen a big advancement through ages; concepts, procedures and technologies, it has also seen a similar advancement of language. What unites language and media is the fact that each one of them guides and contributes to the other; media exists and results from language and from the other sign systems, and what strengthens this connection is the symbolic language system, as media helps it by providing knowledge and information. The change that occurred through time must leave a significant trace in the media, for example Diction, which has changed concerning development and growth, also the ways and mediums of media have become manifold and widespread. This change affected the recipient whether it was a reader, listener o
... Show MoreBackground: Selenium-73 with half- life of 7.15 hour emits β+ in nature and has six stable isotopes which are ( 74Se,76Se,77Se,78Se,80Se and 82Se ). Selenium-73 has many applications in technology and radioselenium compounds of metallic have found various applications in medicine.
Objective: To make a comparison between different reactions that produced cross sections of Se-73 radioisotopes.
Subjects and methods: The feasibility of the production of Selenium -73 via various nuclear reactions was investigated. Excitation functions of 73Se production by the re
... Show MoreFace recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreTaking into account the significance of food chains in the environment, it demonstrates the interdependence of all living things and has economic implications for people. Hunting cooperation, fear, and intraspecific competition are all included in a food chain model that has been developed and researched. The study tries to comprehend how these elements affect the behavior of species along the food chain. We first examined the suggested model's solution properties before calculating every potential equilibrium point and examining the stability and bifurcation nearby. We have identified the factors that guarantee the global stability of the positive equilibrium point using the geometric approach. Additionally, the circumstances that would gu
... Show MoreThe significant addition of immersive technologies, Virtual Reality (VR), Augmented Reality(AR) and Mixed Reality(MR) are transforming the domain of design education. Still, finding an equilibrium between these new tools alongside with traditional methods of teaching is a menace which educational institutes needs to solve. This paper proposes a structure that would help the ease with which to include immersive technologies within design education, keeping in mind the solid points of more conventional pedagogical methods. Based on a survey of interior design programs, this research highlights the potential for VR, AR and MR in student engagement, creativity skills and professional practices. The results suggest that adoption of an im
... Show MoreThe finite element method has been used in this paper to investigate the behavior of precast reinforced concrete dapped-ends beams (DEBs) numerically. A parametric investigation was performed on an experimental specimen tested by a previous researcher to show the effect of numerous parameters on the strength and behavior of RC dapped-end beams. Reinforcement details and steel arrangement, the influence of concrete compressive strength, the effect of inclined load, and the effect of support settlement on the strength of dapped-ends beams are examples of such parameters. The results revealed that the dapped-end reinforcement arrangement greatly affects the behavior of dapped end beam. The failure load decreases by 25% when
... Show MoreThe influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe ongoing COVID‐19 pandemic caused by SARS‐CoV‐2 is associated with high morbidity and mortality. This zoonotic virus has emerged in Wuhan of China in December 2019 from bats and pangolins probably and continuing the human‐to‐human transmission globally since last two years. As there is no efficient approved treatment, a number of vaccines were developed at an unprecedented speed to counter the pandemic. Moreover, vaccine hesitancy is observed that may be another possible reason for this never ending pandemic. In the meantime, several variants and mutations were identified and causing multiple waves globally. Now the safety and efficacy of these vaccines are debatable and recommended to d