Preferred Language
Articles
/
ohevJJIBVTCNdQwCW578
Preparation and Evaluation of Atenolol Floating Beads as a Controlled Delivery System
...Show More Authors

         This study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepared atenolol beads remained floating on 0.1 N HCl (pH 1.2) medium over 24 hours. Besides, high yield beads of 73.07- 84.31% was obtained. Encapsulation efficiencies were in the range of 33.10 % -79.04 %, and were found to increase as a function of increasing drug: polymer mixture ratio and the gelling agent concentrations.Moreover, atenolol release profile from the beads was affected by the pH of the dissolution medium. It was found to be slowest in 0.1 N HCl (pH 1.2) and fastest in phosphate buffer (pH 6.8).The obtained results suggest that atenolol could be formulated as a controlled release beads, using ethylcellulose and alginate as polymers, using ACPD method. Keywords: Floating beads, Atenolol, Controlled Delivery System

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)
...Show More Authors

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Evaluation of the Antibiofilm Activity of Laurus nobilis Leaves Extract and Assessment of Its Effect on fimA and papC genes in Escherichia coli isolates
...Show More Authors

Background: The beneficial gut bacterium E. coli can cause blood poisoning, diarrhoea, and other gastrointestinal and systemic disorders. Objective: This study amid to examines the antibiofilm activity of Laurus nobilis leaves extract on E. coli isolates and compares pre- and post-treatment gene expression of fimA and papC genes. Subjects and Methods: Ten isolates of E. coli were obtained from the Genetic Engineering and Biotechnology Institute, University of Baghdad, which was previously collected from Baghdad city hospitals and diagnosed by chemical tests, the diagnosis was confirmed using VITEK-2 System. The preparation of the aqueous and methanolic Laurus nobilis leaves extracts was done by using the maceration method and Soxhlet appara

... Show More
View Publication
Publication Date
Fri Jan 01 2010
Journal Name
Int. J. Adv. Comp. Techn.
Adding PC Connectivity to the MTS-88 Microcomputer Teaching System
...Show More Authors

The MTS-88. c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to be erased and the system to stop responding. Also, this system lacks the ability to be connected to the PC. The aim of this work is to modify the system to make it possible to be connected to the PC through the parallel port. This gives the capability to download long programs to the system after being developed in the PC. The 8255 Programmable Peripheral Interface available in the teaching system is interfaced to the parallel port and used as

... Show More
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Integral Sliding Mode Control Design for Electronic Throttle Valve System
...Show More Authors

Abstract

 One of the major components in an automobile engine is the throttle valve part. It is used to keep up with emissions and fuel efficiency low. Design a control system to the throttle valve is newly common requirement trend in automotive technology. The non-smoothness nonlinearity in throttle valve model are due to the friction model and the nonlinear spring, the uncertainty in system parameters and non-satisfying the matching condition are the main obstacles when designing a throttle plate controller.

In this work, the theory of the Integral Sliding Mode Control (ISMC) is utilized to design a robust controller for the Electronic Throttle Valve (ETV) system. From the first in

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 03 2008
Journal Name
All Days
Correlations for Optimum Separation Pressures for Sequential Field Separation System
...Show More Authors
ABSRACT<p>A study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.</p><p>Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al</p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref