Author(s):  
Sumant Saini ◽  
Yashwant .

Solid dispersions are one of the most promising strategies to improve the oral bioavailability of poorly water soluble drugs. By reducing drug particle size to the absolute minimum, and hence improving drug wettability, bioavailability may be significantly improved. This article reviews the various preparation techniques for solid dispersion and compiles some of the recent technology transfers. The different types of solid dispersions based on the molecular arrangement have been highlighted. Some of the practical aspects to be considered for the preparation of solid dispersions, such as selection of carrier, solvent and methods of physicochemical characterization, along with an insight into the molecular arrangement of drugs in solid dispersions are also discussed. In this review, it is intended to discuss the recent advances related on the area of solid dispersions.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 378
Author(s):  
Alberto Partida ◽  
Regino Criado ◽  
Miguel Romance

Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.


2007 ◽  
Vol 31 (4) ◽  
pp. 553-581 ◽  
Author(s):  
Rajiv Nayan

2021 ◽  
Author(s):  
Christian Windisch

Abstract This paper presents a holistic approach to modern oilfield and well surveillance through the inclusion of state-of-the-art edge computing applications in combination with a novel type of data transmission technology and algorithms developed in-house for automatic condition monitoring of SRP systems. The objective is to enable the responsible specialist staff to focus on the most important decisions regarding oilfield management, rather than wasting time with data collection and preparation. An own operated data communication system, based on LPWAN-technology transfers the dyno-cards, generated by an electric load cell, into the in-house developed production assistance software platform. Suitable programmed AI-algorithms enable automatic condition detection of the incoming dyno cards, including conversion and analysis of the corresponding subsurface dynamograms. A smart alarming system informs about occurring failure conditions and specifies whether an incident of rod rupture, pump-off condition, gas lock or paraffin precipitation occurred in the well. A surface mounted measuring device delivers liquid level and bottomhole pressure information automatically into the software. Based on these diverse data, the operations team plans the subsequent activities. The holistic application approach is illustrated using the case study of an SPR-operated well in an Austrian brownfield.


Sign in / Sign up

Export Citation Format

Share Document