Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Experimental Design, Synthesis And Application Of Molecular Micelle Modified Polymeric Nanoparticles For Drug Delivery Systems And Free Radical Detection, Gabriela M. Ganea Visser Jan 2009

Experimental Design, Synthesis And Application Of Molecular Micelle Modified Polymeric Nanoparticles For Drug Delivery Systems And Free Radical Detection, Gabriela M. Ganea Visser

LSU Doctoral Dissertations

Biodegradable and biocompatible polymeric nanoparticles such as poly (lactide-co-glycolide) (PLGA) nanoparticles have been extensively studied as drug delivery systems for a variety of pharmaceutical agents. Nanoparticle surface properties are primarily determined by the emulsifiers used in the synthesis process, which have a significant impact on nanoparticle physico-chemical and biological properties. Anionic amino acid – based molecular micelles were used in the emulsification process to prepare monodisperse, small (below 100 nm) PLGA nanoparticles with a well defined spherical shape. Such molecular micelle – modified nanoparticles were used as drug carriers for delivery of antioxidants. Thymoquinone is a natural antioxidant, and an …


An Optimization Approach For The Cascade Vulnerability Problem, Christian Servin Jan 2009

An Optimization Approach For The Cascade Vulnerability Problem, Christian Servin

Open Access Theses & Dissertations

In inter-connected systems, where several computers share information with each other, problems may arise when inappropriate information starts to flow through. For example, let us consider a simple scenario of a university composed of three departments: payroll, financial aid, and academic services. We know that the payroll department deals with sensitive information, such as social security numbers, dates of birth, amounts of wages, etc. The financial aid department may use information that payroll owns. Similarly, the academic department communicates with the financial aid department. An intruder can take advantage of this network connectivity and create an inappropriate flow of information …