The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-release duration and dissolution efficiency were examined in various dissolution media, such as physiological pH (7.4) and simulated stomach fluid (3.4). Consequently, the optimized double-layer for hydrophobic molecules delivery system showed a gradual release of hydrophobic molecules in the and in physiological pH, indicating its novelty for using as a platform for hydrophobic molecules delivery.
The calibration of the three meter Baghdad University Radio Telescope (BURT) has been performed using two types of calibrations: Antenna Position calibration, and Detector calibration. The sun is used as a reference source to calibrate the telescope. The antenna position Azimuth (Az), and Elevation (El) are calibrate according to sun's azimuth and elevation in the date (11/10/2017; at time 10:19 AM). A calibration report is designed to illustrate the calibration parameters for each specific date and time. The detector calibration is representing a study for power spectrum response for the sun according to radio telescope frequency band (1.3 GHz – 1.5 GHz) with central frequency (1.42 GHz). Drift Scan function in the telescope's softwar
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
Abstract
This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per
... Show MoreMedication safety is an important part of the comprehensive patient safety term. Medication safety is gaining more attention as the World Health Organization set the goal of decreasing medication harm by (50%) for the next 5 years when launching the third global challenge. Studying medication safety in the risk groups such as young ages, children are crucial to learn more about the effect of medicines in this risk group since they are not included in the clinical trials. Adverse drug reaction is defined as any harm resulted from the drug itself during medical process journey, while medication errors are any harm resulted from the treatment process rather than the drug or it is the result of the failure in a step of the treatment process
... Show MoreSmishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show More
The advertising mail is considered as one of potential tools that followed to transfer the printed messages to the consumers and public customers whom are located at homes or works. This type of advertising is preferable due to the zero expense to receive the announcements of products, which became recently one of the successful procedures to create new customers and keep them in touch with direct communication. It is also possible to send them to specific group of people who can be classified by the advertisers to select even by name their own clients to give the personality to the clients for a long term of communication.
&
... Show MoreSocial risks posed a great challenge to the development path in Iraq, which resulted in widening the development gaps, whether these gaps were between rural and embargoed areas, or between Iraqi governorates, and the gender gap. Besides, the nature of the reciprocal relationship between the social risks and the development process requires the adoption of development trends that are sensitive to the risks that take upon themselves the prompt and correct response to these risks, away from randomness and confusion that Iraq suffered from for decades. However, currently, the situation has differed a great deal. This is because the size and types of such gaps have widened and become more complicated than before; a matter which has led to hav
... Show MoreThe research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show More