Search results for "Injection"

showing 10 items of 920 documents

Simultaneous dissolution profiles of two drugs in pharmaceutical formulations by an FIA manifold

2002

Abstract This article deals with the simultaneous determination of dissolution profiles of two drugs with overlapped spectra, present in the same pharmaceutical formulation. The official procedure for the dissolution profile is adapted to the continuous-flow methodology; the dissolution vessel is connected to an FIA manifold, in which the sample aliquots from the dissolution vessel are treated in order to adjust to the suitable pH and dilution degree to be monitored. The resulting solution is injected into the carrier stream, an acetic acid–acetate buffer at pH 4.3 and forced to the flow-cell of the spectrophotometer. The simultaneous determination of both profiles is based on the first der…

ChromatographySulfamethoxazoleChemistryClinical BiochemistryPharmaceutical SciencePharmaceutical formulationTrimethoprimDosage formAnalytical Chemistrylaw.inventionDilutionAnti-Infective AgentsSolubilitylawFlow Injection AnalysisDrug DiscoveryManifold (fluid mechanics)Quantitative analysis (chemistry)DissolutionSpectroscopyAnalysis methodJournal of Pharmaceutical and Biomedical Analysis
researchProduct

In situ generation of Co(II) by use of a solid-phase reactor in an FIA assembly for the spectrophotometric determination of penicillamine

2005

[EN] A flow injection analysis (FIA) manifold for the determination of penicillamine in pharmaceutical preparations is proposed. The manifold includes a solid-phase reactor for the in situ production of the derivatizing reagent, Co(II) ion, which forms a coloured complex with penicillamine in an alkaline medium. The reactor is prepared by natural immobilization of cobalt carbonate on a polymer matrix, which endows it with a high mechanical and microbiological stability. The cobalt released by passage of a 5 x 10(-4) Mol l(-1) sulphuric acid stream at a flow-rate of 2.3 ml min(-1) is merged with a volume of 314 mu l of sample containing penicillamine in ammonium-ammonia buffer at pH 9.5 to m…

Clinical BiochemistryPharmaceutical Sciencechemistry.chemical_elementAnalytical ChemistryMatrix (chemical analysis)AbsorbanceFIAFlow injection analysisSpectrophotometryDrug DiscoveryQUIMICA ANALITICAmedicineSpectroscopyFlow injection analysisDetection limitChromatographymedicine.diagnostic_testChemistrySpectrum AnalysisPenicillaminePenicillamineReproducibility of ResultsCobaltSolid-phase reactorReagentPharmaceuticalsCobaltmedicine.drug
researchProduct

Efficient gene delivery to the inflamed colon by local administration of recombinant adenoviruses with normal or modified fibre structure

1999

BACKGROUND/AIMSReplication deficient recombinant adenoviruses represent an efficient means of transferring genes in vivo into a wide variety of dividing and quiescent cells from many different organs. Although the gastrointestinal tract is a potentially attractive target for gene therapy approaches, only a few studies on the use of viral gene transfer vehicles in the gut have been reported. The prospects of using recombinant adenoviruses for gene delivery into epithelial and subepithelial cells of the normal and inflamed colon are here analysed.METHODSAn E1/E3 deleted recombinant adenovirus (denoted AdCMVβGal) and an adenovirus with modified fibre structure (denoted AdZ.F(pk7)) both express…

ColonT cellGenetic enhancementGenetic VectorsGene ExpressionBiologyGene deliverymedicine.disease_causeRecombinant virusArticleAdenoviridaeMiceAdministration RectalGene expressionmedicineAnimalsHumansReporter geneLamina propriaMice Inbred BALB CGastroenterologyGene Transfer TechniquesDefective VirusesColitisInflammatory Bowel Diseasesbeta-GalactosidaseVirologyMolecular biologyAdenoviridaemedicine.anatomical_structureInjections IntravenousInjections Intraperitoneal
researchProduct

On bijections vs. unary functions

1996

A set of finite structures is in Binary NP if it can be characterized by existential second order formulas in which second order quantification is over relations of arity 2. In [DLS95] subclasses of Binary NP were considered, in which the second order quantifiers range only over certain classes of relations. It was shown that many of these subclasses coincide and that all of them can be ordered in a three-level linear hierarchy, the levels of which are represented by bijections, successor relations and unary functions respectively.

CombinatoricsSet (abstract data type)Range (mathematics)Unary operationHierarchy (mathematics)Computer Science::Logic in Computer ScienceOrder (group theory)Unary functionArityBijection injection and surjectionComputer Science::Formal Languages and Automata TheoryMathematics
researchProduct

Compression and injection molding of recycled polyethylene for greenhouses in presence of the natural fibres

2003

Compression and injection molding greenhouses natural fibres
researchProduct

Compression and injection molding of recycled polyethylene for greenhouses in presence of the natural fibers

2003

Compression and injection molding recycled polyethylene
researchProduct

Fault Injection into VHDL Models: Experimental Validation of a Fault-Tolerant Microcomputer System

1999

This work presents a campaign of fault injection to validate the dependability of a fault tolerant microcomputer system. The system is duplex with cold stand-by sparing, parity detection and a watchdog timer. The faults have been injected on a chip-level VHDL model, using an injection tool designed with this purpose. We have carried out a set of injection experiments (with 3000 injections each), injecting transient and permanent faults of types stuck-at, open-line and indetermination on both the signals and variables of the system, running a workload. We have analysed the pathology of the propagated errors, measured their latency, and calculated both detection and recovery coverage. We have…

Computer scienceMicrocomputer systemReal-time computingDuplex (telecommunications)Fault toleranceHardware_PERFORMANCEANDRELIABILITYFault injectionWatchdog timerFault coverageVHDLDependabilityhuman activitiescomputercomputer.programming_language
researchProduct

Security Challenges of IoT-Based Smart Home Appliances

2018

The Internet of Things, IoT, and the related security challenges are reaching homes in the form of smart appliances. If the appliances are compromised, they can be used in botnet attacks against Internet services and potentially cause harm to people and property through the local network, for example, by heating up too much or allowing unauthorized access. The aim of this study was to see how secure these devices are against remote and network attacks. Several devices were tested with attacks coming from the same Wi-Fi network to gain various levels of control of the devices. Their security against a Man-in-the-Middle attack was also studied to see differences in the susceptibility to conne…

Computer sciencebusiness.industryBotnetLocal area network020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEvil twinHarmHome automation020204 information systems0202 electrical engineering electronic engineering information engineeringCode injectionThe InternetbusinesscomputerVulnerability (computing)
researchProduct

Automated Uncertainty Quantification Through Information Fusion in Manufacturing Processes

2017

International audience; Evaluation of key performance indicators (KPIs) such as energy consumption is essential for decision-making during the design and operation of smart manufacturing systems. The measurements of KPIs are strongly affected by several uncertainty sources such as input material uncertainty, the inherent variability in the manufacturing process, model uncertainty, and the uncertainty in the sensor measurements of operational data. A comprehensive understanding of the uncertainty sources and their effect on the KPIs is required to make the manufacturing processes more efficient. Towards this objective, this paper proposed an automated methodology to generate a hierarchical B…

Computer scienceinjection molding02 engineering and technologycomputer.software_genreIndustrial and Manufacturing Engineering[SPI]Engineering Sciences [physics]GME0202 electrical engineering electronic engineering information engineeringUncertainty quantificationuncertaintyautomationhierarchicalbusiness.industryBayesian network020207 software engineeringmeta-modelAutomationComputer Science ApplicationsMetamodelingInformation fusionBayesian networkControl and Systems Engineeringsemantic020201 artificial intelligence & image processingData miningbusinesscomputer
researchProduct

Control Flow Error Checking with ISIS

2005

The Interleaved Signature Instruction Stream (ISIS) is a signature embedding technique that allows signatures to co-exist with the main processor instruction stream with a minimal impact on processor performance, without sacrificing error detection coverage or latency. While ISIS incorporate some novel error detection mechanisms to assess the integrity of the program executed by the main processor, the limited number of bits available in the signature control word question if the detection mechanisms are effective detecting errors in the program execution flow. Increasing the signature size would negatively impact the memory requirements, so this option has been rejected. The effectiveness …

Control flowbusiness.industryComputer scienceReal-time computingSoftware developmentEmbeddingRetardFault injectionLatency (engineering)Error checkingError detection and correctionbusiness
researchProduct