Sildenafil, tadalafil, and vardenafil are phosphodiesterase type 5 enzyme (PDE-5) inhibitors used for the treatment of male erectile dysfunction. This present study aims to investigate 55 herbal products indicated for men’s sexual health from the Malaysian market for adulteration of PDE-5 inhibitors and analogues. The screening and identification of 20 PDE-5 inhibitors and analogues in herbal products of various forms (powder, capsules, tablets, and pastels) were conducted using gas chromatography–electron impact-mass spectrometer (GC-EI-MS). The analysis has shown that 19 herbal products were adulterated with PDE-5 inhibitors and analogues. Unique ion fragmentations and the presence of molecular ion serve as potential markers, and the limit of detection (LOD) was 0.1-5.0 µg/g. Ten PDE-5 inhibitors and analogues were randomly selected and successfully validated for simultaneous quantification, whereby the limit of quantitation (LOQ) was 5.0–50.0 µg/g with recoveries at 86.1-118.9%. The developed method of GC-EI-MS was shown to be simple, throughput, economical and had sufficient sensitivity to screen, identify and quantify PDE-5 inhibitors and analogues in herbal matrices.
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MoreBreast mass is by far the most important clinical problem that concerns the breast today. This study was carried out to evaluate diode laser as a cutting tool in breast mass excision and as a hemostatic tool for coagulation during surgery. Using 810 nm diode laser with optical fiber 600μm in diameter of conical tip, udder (cow's breast) tissue, and three female patients (mean age of 35.5 y with clinically palpable breast mass) had been used in this study. The patients were followed up regularly postoperatively. In preliminary work on udder tissue, the power needed for cutting and excision was 15W (power density= 5.3 kW/cm2). The time consumed for excision of a piece of udder tissue, 40×10×3 mm in dimensions was 5 min. The depth range
... Show MoreThe study aimed to identify the E-leadership practice at Princess Nora Bint Abdul Rahman University and to explore the obstacles that are facing the leaders in the implementation of E-leadership, in addition to find mechanisms to improve the practice of electronic driving at the university in light of the Corona pandemic. A descriptive analytical approach was used by depending on a questionnaire to collect the needed data. The study sample consisted of (139) heads of departments, attorneys' colleges and support Deanships universities. The study results showed that E-leadership employment recorded a medium to high degree. Especially at university, that publishing decisions electronically and uses technical means in providing its services.
... Show MoreThe subject of the evolution of fire insurance of the hottest topics accidents, because it falls within the commercial insurance, as its importance is reflected for being a security source and contentment of the insured person and so it is worth pointing out the importance of fire insurance in enterprises and organizations of all kinds, because of the guarantee of its assets from meridian as well as protection from the effects of the fire therefore ensure continuity in the performance of their activities
That the essential contribution of this research is a description of how complex systems analysis service of the properties of the queue in Baghdad Teaching Hospital using a technique network is techniques method (Q - GERT) an acronym of the words:
Queuing theory _ Graphical Evaluation and Review Technique
Any method of assessment and review chart where you will be see the movement flow of patients within the system and after using this portal will be represented system in the form of planned network probabilistic analysis and knowledge of statistical distributions appropriate for times of arrival and departure were using the program ready (Win QSB) and simulatio
... Show More