n this paper, we formulate three mathematical models using spline functions, such as linear, quadratic and cubic functions to approximate the mathematical model for incoming water to some dams. We will implement this model on dams of both rivers; dams on the Tigris are Mosul and Amara while dams on the Euphrates are Hadetha and Al-Hindya.
The present study is to formulate and evaluate Acyclovir (ACV) microspheres using natural polymers like chitosan and sodium alginate. ACV is a DNA polymerase inhibitor used in treating herpes simplex virus infection and zoster varicella infections. Acyclovir is a suitable candidate for sustained-release (SR) administration as a result of its dosage regimen twice or thrice a day and relatively short plasma half-life (approximately 2 to 4 hours). Microspheres of ACV were prepared by an ionic dilution method using chitosan and sodium alginate as polymers. The prepared ACV microspheres were then subjected to FTIR, SEM, particle size, % yield, entrapment efficiency, in vitro dissolution studies and release kinetics mechanism. The FTI
... Show MoreThe aim of this study is to formulate and evaluate ezetimibe nanoparticles using solvent antisolvent technology. Ezetimibe is a practically water-insoluble drug which acts as a lipid lowering drug that selectively inhibits the intestinal absorption of cholesterol and related phytosterols. Ezetimibe prepared as nano particles in order to improve its solubility and dissolution rate.
Thirty formulas were prepared and different stabilizing agents were used with different concentrations such as poly vinyl pyrrolidone (PVPK-30), poly vinyl alcohol (PVA), hydroxy propyl methyl cellulose E5 (HPMC), and poloxamer. The ratios of drug to stabilizers used to prepare the nanoparticles were 1: 2, 1:3 and 1:4.
The prepared nanoparticles
... Show MoreFinding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreA total of 20 raw milk samples were used as the fouling agent for evaluating the bacteriological effectiveness of cleaning and sanitizing of domestic milking equipment by using ozonated water at 0.5 ppm comparing to the warm water at 55! for 5 minutes respectively. The mean values of total aerobic bacteria, Coliform and E.coli that present on the plastic and stainless-steel containers after using the raw milk as fouling agent were 3.4×10-6 , 6.7x10-5 and 5.8×10-3 cfu/cm2 respectively , after cleaning the stainless steel containers by the ozonated water the mean values of total aerobic bacterial counts, Coliforms and E.coli bacteria were reduced to 1.2×10-6, 4.7×10-5 and 3.3×10-3 CFU/cm2 respectively. while after cleaning by the warm wa
... Show MoreThe high cost of chemical analysis of water has necessitated various researches into finding alternative method of determining portable water quality. This paper is aimed at modelling the turbidity value as a water quality parameter. Mathematical models for turbidity removal were developed based on the relationships between water turbidity and other water criteria. Results showed that the turbidity of water is the cumulative effect of the individual parameters/factors affecting the system. A model equation for the evaluation and prediction of a clarifier’s performance was developed:
Model: T = T0(-1.36729 + 0.037101∙10λpH + 0.048928t + 0.00741387∙alk)
The developed model will aid the predictiv
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More