Search results for "Injection"
showing 10 items of 920 documents
Simultaneous dissolution profiles of two drugs in pharmaceutical formulations by an FIA manifold
2002
Abstract This article deals with the simultaneous determination of dissolution profiles of two drugs with overlapped spectra, present in the same pharmaceutical formulation. The official procedure for the dissolution profile is adapted to the continuous-flow methodology; the dissolution vessel is connected to an FIA manifold, in which the sample aliquots from the dissolution vessel are treated in order to adjust to the suitable pH and dilution degree to be monitored. The resulting solution is injected into the carrier stream, an acetic acid–acetate buffer at pH 4.3 and forced to the flow-cell of the spectrophotometer. The simultaneous determination of both profiles is based on the first der…
In situ generation of Co(II) by use of a solid-phase reactor in an FIA assembly for the spectrophotometric determination of penicillamine
2005
[EN] A flow injection analysis (FIA) manifold for the determination of penicillamine in pharmaceutical preparations is proposed. The manifold includes a solid-phase reactor for the in situ production of the derivatizing reagent, Co(II) ion, which forms a coloured complex with penicillamine in an alkaline medium. The reactor is prepared by natural immobilization of cobalt carbonate on a polymer matrix, which endows it with a high mechanical and microbiological stability. The cobalt released by passage of a 5 x 10(-4) Mol l(-1) sulphuric acid stream at a flow-rate of 2.3 ml min(-1) is merged with a volume of 314 mu l of sample containing penicillamine in ammonium-ammonia buffer at pH 9.5 to m…
Efficient gene delivery to the inflamed colon by local administration of recombinant adenoviruses with normal or modified fibre structure
1999
BACKGROUND/AIMSReplication deficient recombinant adenoviruses represent an efficient means of transferring genes in vivo into a wide variety of dividing and quiescent cells from many different organs. Although the gastrointestinal tract is a potentially attractive target for gene therapy approaches, only a few studies on the use of viral gene transfer vehicles in the gut have been reported. The prospects of using recombinant adenoviruses for gene delivery into epithelial and subepithelial cells of the normal and inflamed colon are here analysed.METHODSAn E1/E3 deleted recombinant adenovirus (denoted AdCMVβGal) and an adenovirus with modified fibre structure (denoted AdZ.F(pk7)) both express…
On bijections vs. unary functions
1996
A set of finite structures is in Binary NP if it can be characterized by existential second order formulas in which second order quantification is over relations of arity 2. In [DLS95] subclasses of Binary NP were considered, in which the second order quantifiers range only over certain classes of relations. It was shown that many of these subclasses coincide and that all of them can be ordered in a three-level linear hierarchy, the levels of which are represented by bijections, successor relations and unary functions respectively.
Compression and injection molding of recycled polyethylene for greenhouses in presence of the natural fibres
2003
Compression and injection molding of recycled polyethylene for greenhouses in presence of the natural fibers
2003
Fault Injection into VHDL Models: Experimental Validation of a Fault-Tolerant Microcomputer System
1999
This work presents a campaign of fault injection to validate the dependability of a fault tolerant microcomputer system. The system is duplex with cold stand-by sparing, parity detection and a watchdog timer. The faults have been injected on a chip-level VHDL model, using an injection tool designed with this purpose. We have carried out a set of injection experiments (with 3000 injections each), injecting transient and permanent faults of types stuck-at, open-line and indetermination on both the signals and variables of the system, running a workload. We have analysed the pathology of the propagated errors, measured their latency, and calculated both detection and recovery coverage. We have…
Security Challenges of IoT-Based Smart Home Appliances
2018
The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…
Automated Uncertainty Quantification Through Information Fusion in Manufacturing Processes
2017
International audience; Evaluation of key performance indicators (KPIs) such as energy consumption is essential for decision-making during the design and operation of smart manufacturing systems. The measurements of KPIs are strongly affected by several uncertainty sources such as input material uncertainty, the inherent variability in the manufacturing process, model uncertainty, and the uncertainty in the sensor measurements of operational data. A comprehensive understanding of the uncertainty sources and their effect on the KPIs is required to make the manufacturing processes more efficient. Towards this objective, this paper proposed an automated methodology to generate a hierarchical B…
Control Flow Error Checking with ISIS
2005
The Interleaved Signature Instruction Stream (ISIS) is a signature embedding technique that allows signatures to co-exist with the main processor instruction stream with a minimal impact on processor performance, without sacrificing error detection coverage or latency. While ISIS incorporate some novel error detection mechanisms to assess the integrity of the program executed by the main processor, the limited number of bits available in the signature control word question if the detection mechanisms are effective detecting errors in the program execution flow. Increasing the signature size would negatively impact the memory requirements, so this option has been rejected. The effectiveness …