A space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.
This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, rec
... Show MoreThis paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th
... Show MorePolymers have the ability to extract water after they have been added to the mortar or concrete mixture. They provide the absorbed water during hydration functioning as internal water source. Absorption polymers can absorb up to hundred times of their own weight of pure water.This research deals with the use of water absorption polymer balls in concrete and study the volumetric change of these mixes and compared the results with reference mix (without polymers). Samples were cured both in air and in water for the mixes to compare results which show that samples in air behave for expansion while sample in water acted for shrinkage.
Four batches of sertraline HCl microspheres were prepared using a poly (D-L-lactide-co-glycolide) (PLGA) polymer ( Mw. 9, 27, 30 and 83 KDa) as a delivery system. The microspheres were prepared by a dispersion/solvent extraction-evaporation method and characterized for drug loading by UV, particle size by laser diffractometry and surface morphology by scanning electron microscopy (SEM). The in vitro sertraline HCl release was studied. Spherical microspheres with a mean diameter of 21 to 26 µm loaded with 24.6 – 38.2% were produced. The in vitro drug release was shown to be depend on polymer molecular weight and also on the drug loading. Differential scanning calorimetry (DSC) was employed to investigate the physical state
... Show MoreWet granulation method was used instead of conventional pan coating or fluidized –bed coating technique to prepare enteric-coated diclofenac sodium granules, using ethanolic solution of EudragitTM L100 as coating, binding and granulating agent .Addition of PEG400 or di-n-butyl phthalate as a plasticizer was found to improve the enteric property of the coat.
Part of the resulted granules was filled in hard gelatin capsules (size 0), while the other part was compressed into tablets with and without disintegrant.
The release profile of these two dosage forms in 0.1N HCl (pH 1.2)for 2 hours, and in phosphate buffer (pH 6.8) for 45 minutes as well as the release kinetic were compared with that of the en
... Show MoreThe security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show More