• Key factors affecting transnational knowledge transfer in the context of the Euroaid Asia programme

      Nie, Wanyan (University of Bedfordshire, 2007-09)
      The thesis aims to identify and verify the key factors affecting transnational knowledge transfer (TKT) in the context of the EuroAid Asia Programme. This study extends the existing research on knowledge transfer (KT) by investigating the neglected area of TKT, an area which needs better understanding, given the rapid development of TKT. Compared to the KT at the individual, group, or organizational level, TKT is both more complicated to comprehend, and has received less attention. This study begins with a literature review of the definition of knowledge and KT, analysis of KT at different levels, and summary of a comprehensive set of factors that may influence KT. Then, in order to empirically explore the key factors affecting TKT in the EuroAid Asia Programme and to evaluate the relative importance between factors, an international Delphi survey is employed. Through the two rounds, experts mentioned twenty-four factors and provided explanations for their views. Based on these survey results, a factorial model is developed. The verified factors and the proposed model could help project participants better understand the process of TKT, remind them what key factors really influence the process of TKT and urge them to make an active effort to properly assess each factor before prioritizing the factors for management attention.
    • Laboratory and field-based assessments to determine the anthropometric and physiological characteristics of elite soccer players

      Morris, Tessa E. (University of Bedfordshire, 2015-02)
      This thesis investigated the anthropometric, aerobic and anaerobic characteristics of elite male and female soccer players. Forty-three male (age, 23.6 ± 5.5 years; stature, 1.86 ± 0.13 m; body mass, 89.5 ± 16.5 kg) and eighteen female soccer players (age, 29.7 ± 9.5 years; stature, 1.69 ± 0.68 m; body mass, 64.6 ± 9.7 kg) from the highest respective English domestic leagues participated in the studies. The male soccer players were assessed on three occasions; End of Season (EOS), Prior to Pre-season (PTP) and Post Pre-season (PPS), performing a motorised treadmill incremental test to determine O2max and sum of eight skinfolds to estimate body fat. Female soccer players were assessed on a single occasion at the start of pre-season, performing repeat sprint ability (RSA) assessment (7 x 30m in 20 sec intervals) and sum of eight skinfolds; as well as friendly matches monitored for physical loading using global positioning satellite system (GPS) devices. The elite male players’ estimated body fat was lowest EOS, however O2max values were also lower (55.5 ± 4.8 ml•kg-1•min-1) than PTP (56.7 ± 6.5 ml•kg-1•min-1) and significantly lower than EOP (61.7± 6.1 ml•kg-1•min-1) (r =0.70, R2 = 0.32; p < 0.01). Females’ estimated body fat correlated significantly with RSA performance (r = 0.71, R2 = 0.32; p < 0.01). RSA was also significantly correlated to the number of match-based high intensity efforts performed (speeds≥ 4.1 m•s-1) (r = -0.77, R2 = 0.52; p < 0.01). This study demonstrates that in elite male soccer players, O2max values observed after pre-season are significantly greater than the preceding post-season results, illustrating a decline in aerobic capacity toward the end of a competitive season. Additionally, body fat and anaerobic capability (RSA) appear to be interrelated within elite female soccer, as well as the RSA results being associated with players’ capability to perform repeated high intensity efforts during match-play.
    • Lilith : a mythological study

      Smith, Tracey Louise (University of Bedfordshire, 2008-12)
      Lilith – A Mythological Study is the accompanying thesis to my creative piece, Chrysalis, a novel which centres on the protagonist Melissa and her possession by the demoness Lilith. My thesis is an exploration of Lilith throughout mythology, from her early incarnations in Mesopotamia, through Christian texts, to Jewish folktales, looking at how the various elements of her legend, namely as a succubus, demoness and child killer, have evolved. Here I also explore a number of other myths which portray demonised female figures, and compare them to Lilith, posing the question: is Lilith such an archetypal character that she sparks similar myths across the ancient world, or is it merely that strong women were easy to demonise in male-dominated religions? In order to answer this, I go on to study how Lilith’s femininity has contributed to her myth, and how women in general have been demonised by patriarchal and religious societies. Through this I also touch upon the subject of feminist representation by discussing the concepts of the ‘other’ and abjection, and how Lilith has become an icon for modern feminist movements. Finally I turn to Lilith in Chrysalis, and how I built her up as a central character to my plot. Also, I look at the genre of my work, teen fantasy fiction, and discuss its main themes through studying a number of comparable texts, before applying my findings, as well as more mainstream literary theory, to my novel.
    • A literary exploration of the second ‘’Ecological Conscience’’, 1960s – 1970s

      Holton, Thomas (University of Bedfordshire, 2017-10)
      This thesis explores how literature during the 1960s and 1970s helped to develop a postmodern or second-wave ‘’ecological conscience’’, and how these new modes of ecological meditation were represented in three essential texts. Silent Spring, Desert Solitaire, and Turtle Island are all milestones of a new, ‘radical’ environmentalism that awakened the public to the ongoing global environmental crisis. Although environmental concerns attracted significant criticism at the time, ‘ecocriticism’ provides the project’s theoretical basis for advocating literature’s importance in enlightening and reconnecting an ecologically unconscious audience to the natural world. These writers search for innovative societal models capable of establishing an updated ecological conscience, displacing the anthropocentric mindset that inhibits both humans and non-humans. Through prose and poetry, this collection investigates the collective ecological conscience during this era, and the authors’ critical roles in the healing of a postmodern ecology rather than the Romantic restoring of a lost, organic world. After much deliberation on the environmental impacts induced by modern industrial societies, a variety of expressions are brought together to articulate how society must learn to embrace the unexplainable and unrepresentable aspects of nature, and how literature can serve as a guideline towards a renewed and ecologically sensitive lifestyle on Earth.
    • Load balancing in distributed query management at web enabled systems

      Vadapalli, Satya (University of Bedfordshire, 2013)
      Every day more and more Business are using web as compulsory medium to provide services. Ever increase in technological advancement leads more devices and applications are accessing web based application around the clock. So single node web applications are prone collapse, designing an application with Distributed frame work and mange those application often reduce the risk of single point failure. In that strategy load balancers plays an important role to direct the traffic to multiple Servers. Existing load balancers are Prone to fail and centralized strategy to distribute the load among the server. Our proposed heuristic based load balancer follows Decentralized approach to solve the problem and our ANN based supervised back propagation technique gives optimized results that existing Load balancers
    • Managerial interpretations and sectoral comparisons of performance management in the third sector

      McKeaveney, Dan (University of Bedfordshire, 2012-10)
      The subject of performance management within the third sector is both a comparatively new area of research and also relevant to wider national debates over the role of charities in delivering services as part of the 'big society.' The austerity programme has affected funding of charities whilst local authorities and other governmental bodies have sought to get more from the third sector for the money they provide. As such it is interesting to see how third sector organisations are managing performance in order to meet these challenges. This research project will interview third sector employers who deliver services on behalf of, or in partnership with, public sector organisations. The third sector is predominantly comprised of registered charities and voluntary groups and the sector has an established track record of providing contracted services using paid staff. The aim of this research is to investigate the performance management culture of sector organisations and, via interviews with key personnel, establish what systems are in place and how managers perceive their effectiveness. The findings of this research should allow voluntary organisations to share best as well as drawing attention to common problems of performance management within the sector. By conducting a thorough examination of academic and business journals related to the areas of performance management, particularly where these concern delivering services for the public good, in addition to third sector specific articles a theoretical basis for this research will be established. Performance management within the third sector is a relatively new and underdeveloped area of research and so there is inherent value in actively comparing articles relating to the public sector, and their experiences of these issues, with original research. Specific literature relating to key theories, models and empirical research will also be examined and reviewed. This research offers an interpretivist view of the sector and will be reliant on the successful interviewing of respondents and coding of their recorded experiences. This presents a number of challenges in ensuring concrete experiences are correctly categorised to differentiate nuances and safeguard against the conflation of unique 'stories' into a broad brush approach. Additionally adjustments for selection bias, the subjectivity of experience, and sample size limitations will be considered.
    • Managerial qualities and management development in the National Health Services

      Thavanayagam, Thavanesan (University of Bedfordshire, 2002-10-28)
      This research was initiated in order to establish the relationship between managerial meta-qualities and the learning style preferences of a senior manager having board level responsibilities. In this connection, the National Health Service (NHS) of the England and Wales was selected for the study. It is one of the largest organizations, complex in operations, having multiple objectives to attain. In the last three decades it is experiencing an on-going complex process of change due to political, economical, social and ethical reasons. Literature search found that no similar researches were completed before. This presumption was subsequently endorsed by those academics involved when consulted It is evident that previous researches have taken diversity from the two main concepts: managerial meta-qualities and learning style preferences since. Popular instruments were used to check the manager profiles, the metaqualities profile and the Learning style preferences profile. The hypothesis tested the relationships between the two key variables, and its significance. The null hypothesis suggests that there exist no relationships. Further, this research contributes knowledge on certain facts where there are necessities for further examination in the future. From the strength of the data it was concluded that having evidence for relationships in two combinations of the sub variables: Mental-agilityReflector and Self-knowledge-Theorist. No relationship found between the two key variables in its consolidated profile state. The observed relationships were quite significant for the high score group compared to that of low score group. Research results also used to predict a balanced learner profile using the pertinent learning style preferences profile. Finally it recommends further imminent researches in this area, certainly with larger sample base.
    • Managing change in SMEs : approaching new markets

      Meredith, Neil (University of Bedfordshire, 2010-03)
      This thesis explores the change management process necessary for a small to medium sized enterprise (SME) to approach new markets with new products or services. The study details relevant literature, its objective to identify best practice to enable the development of a framework and "check list" that will guide decision-makers through the considerations and actions necessary for the change activity to take place. The research outputs take the form of a flow chart process map to be used in conjunction with a series of check lists that prompt the end-user to evaluate their goals against current circumstances and potential future activities. A suitable SME is used as a case study, enabling empirical study and serving as a comparator for the primary output of the research. The outputs of the research were externally tested and verified on a scenario application basis. The work is of particular value to the case study company and similar SME owner / managers undertaking a change process, especially when restricted by limited knowledge, time and money. Further, small business consultants and change agents can utilize the outputs to the same ends.
    • Managing line managers' career development in a public sector organisation: a study of the career development of line managers' within the non-uniformed area of the support service at Cambridgeshire Fire and Rescue Service (CFRS)

      Smith, Cathie (University of Bedfordshire, 2012-10)
      Change has always been with us and organisations in general have all experienced a combination of fast developments in multiple areas such as the economy, technology and society in general. These have wide implications for the management of people at work and in parlicular the planning and management of their careers. Managers have responded to changing environments by adopting new and more flexible organisational structures, which in tum has implications for career patterns. This project presents a case study of a public sector organisation and how the organisation supports the career development of its non-uniformed line managers. It suggests what "good" career development looks like from the perspectives ofpractitioner and theory, as well as those line managers themselves. The project identifies that by providing "good" career development both the organisation and the employee will benefit. The employee by way offeeling valued and rewarded, which enhances performance and aids retention, and the organisation by having committed, satisfied and engaged employees allowing them to plan for the future.
    • MATLOG: a Feistel based poly-alphabetic encryption

      Zaland, Zubair (University of Bedfordshire, 2012-05)
      One might question, "What makes MATLOG different from other feistel based ciphers?", the answer is the encryption methods that are both Feistel and non Feistel. First of all the idea of poly-alphabetic encryption is unique to feistel approach. The capabilities like generating round keys from a single key like Advance Encryption Standard (The Rijndeal Algorithm ) but that of variable lengths and the AES itself not being feistel based. The idea of security through obscurity, although not implemented with its true meaning but MATLOG does not use the user key directly for encryption and the computer generated keys do not directly encrypt the data not even letting the user himself know how it is done. The artefact is currently set to 10 rounds of encryption whereas within each round it performs 2 - 6 rounds of substitution and one round of transposition using two methods of transposition joined as one. In this document I am going to discuss the various standards of encryption and various modes of operation they work on. Then discuss the survey I conducted online in which the university students and other people on social networks having the knowledge of the subject took part, Followed by the design of the algorithm Itself which involves splitting of the plaintext first of all; Splitting the block here means creating two separate blocks out of random numbers and the user data, topic is discussed in further detail under the heading of design. after splitting the blocks we apply transposition to one block and substitution to the other and vice versa to the result of the first round this process goes on for ten rounds and finally we have our cipher text when the result of the two encrypted blocks is merged into one. The decryption process is the same only the keys decrypt the opposite way i.e. the last key decrypts first. The process of key management is very crucial, even though the user key is hardly used in encryption the application has to maintain the user key and the automatically generated keys intact until decryption successfully takes place. MATLOG is a highly flexible and dynamic algorithm it can be set to transposition in several ways, the keys are always different and they process the poly-alphabetically generated data, the keys are also of different size and value for every round within substitution function making the substitution half highly flexible too and best of all it can be commercially implemented both on hardware and the application layer. It can also be set to perform cryptography on storage devices and not only communications. The design of MATLOG is based on independent blocks eliminating the block dependencies like that of cipher block chaining (CBC) , this allows the algorithm to support parallel processing making it as efficient as it would be as any stream cipher algorithm. I have eliminated the Initialization vector in this algorithm and replaced it with the One-time pads making it stronger and leaving no patterns of encryption which was one of the flaws on initialization vector, it needed frequent management one of the reasons that caused the WEP 1 protocol to fail was the short size and mismanagement of the initialization vector, instead my idea of spreading blocks is highly random and the transposition and substitution functions reinforce the safety to the my idea of IV's replacement.
    • A memory-integrated artificial bee algorithm for heuristic optimisation

      Bayraktar, Tugrul (University of Bedfordshire, 2014-02)
      According to studies about bee swarms, they use special techniques for foraging and they are always able to find notified food sources with exact coordinates. In order to succeed in food source exploration, the information about food sources is transferred between employed bees and onlooker bees via waggle dance. In this study, bee colony behaviours are imitated for further search in one of the common real world problems. Traditional solution techniques from literature may not obtain sufficient results; therefore other techniques have become essential for food source exploration. In this study, artificial bee colony (ABC) algorithm is used as a base to fulfil this purpose. When employed and onlooker bees are searching for better food sources, they just memorize the current sources and if they find better one, they erase the all information about the previous best food source. In this case, worker bees may visit same food source repeatedly and this circumstance causes a hill climbing in search. The purpose of this study is exploring how to embed a memory system in ABC algorithm to avoid mentioned repetition. In order to fulfil this intention, a structure of Tabu Search method -Tabu List- is applied to develop a memory system. In this study, we expect that a memory system embedded ABC algorithm provides a further search in feasible area to obtain global optimum or obtain better results in comparison with classic ABC algorithm. Results show that, memory idea needs to be improved to fulfil the purpose of this study. On the other hand, proposed memory idea can be integrated other algorithms or problem types to observe difference.
    • Methods for developing secure software and environments for small and medium enterprises

      Pollonais, Sean (University of Bedfordshire, 2007)
      Information Security covers activity concerned with the protection of data to ensure that information remains available, to those with rightful access, in the condition that it was originally stored or transmitted. The push to interact via electronic data is constantly increasing. Businesses are demanding that software designers find novel ways of facilitating electronic commerce, creating new business models that have only become possible with the development of the Internet. With the increase of traffic in information across the Internet, the risks associated with data have multiplied, matching the global growth in connectivity. Web application security deals with the measures taken to secure software built to promote e-commerce. Because it is necessary to accept user input across the Internet these applications carry a particular set of vulnerabilities that require a more technical approach to their mitigation. The applications themselves are usually composed of modules that interact across trust boundaries which all require hardening. Information Security governance controls how a company secures its data and that of its clients. While there are laws and standards that address the security requirement, applying them to all magnitude of businesses is difficult because the policies are biased towards large organisations in their assumptions of resources. This thesis investigates an international standard that can be used by small businesses to achieve legal compliance and a reasonable level of security. The thesis brings together a method for producing secure web applications and a checklist procedure for improving a company's data protection practices. Both offerings apply to small software production houses where there may be some overlap in role function and the pressure to meet software production deadlines can sometimes lead to a culture where security is seen as an avoidable expense.
    • Mobile Anti Theft System (MATS)

      Shetty, Ajay (University of Bedfordshire, 2012)
      Mobile Anti-Theft system is an application based on Android used for tracing back stolen or lost mobile. Once our system is installed onto a mobile phone and an alternate number is fed into the software (ATS). The owners SIM card gets registered in the database. Whenever phone is rebooted ATS is invoked in stealth mode and verifies whether if the SIM card present in mobile phone is of owner. If the SIM belongs to owner (registered in database), the software doesn’t do any activity. If SIM is been changed and that SIM is not registered in the database then, ATS sends a message to the alternative mobile number (friends / relatives number which is been saved while installing the application) in stealth mode and starts listening for incoming SMS messages. Now if owner send a SMS request to ATS asking for GPS co-ordinates, ATS would do so. Since our system is based on GOOGLE Android operating system our system would send the complete address (postal address) as to where the mobile is.
    • A model to offer reliable data transmissions in vehicular ad hoc network

      Jameel, Meharaj (University of Bedfordshire, 2018-06-18)
      Vehicular Ad-hoc Network (VANET) is one of the widely used networks across various intelligent transport applications in order to support the autonomous driving, reduce network congestion and overcome any kind of the accidents occurring on the road. This report involves in focusing on the safety applications where the vehicles involve in broadcasting the safety messages that are highly time critical and reliability sensitive. The importance of delivering the broadcasted safety messages of VANET in highly timely and reliable manner has resulted in undertaking this research work. In order to support the reliable delivery of the broadcasted safety messages, this research has developed a model called Reliable Vector Clustering (RVC) which involves in neighbour node identification, vehicle cluster formation and broadcasting the coded data using the network coding method. In order to evaluate this developed model, analytical model developed and simulation studies have been carried out in this report. The analytical model has developed a criterion that helps in choosing the best vehicle as the cluster head node and the simulation studies have compared the effectiveness of the developed method. These simulation studies have revealed the effectiveness of proposed RVC method in improving the packet error recovery probability and packet delivery ratio when compared to the existing methods.
    • A model to offer reliable data transmissions in vehicular ad hoc network

      Jameel, Meharaj Theen (University of Bedfordshire, 2020)
      Vehicular Ad-hoc Network (VANET) is one of the widely used networks across various intelligent transport applications in order to support the autonomous driving, reduce network congestion and overcome any kind of the accidents occurring on the road. This report involves in focusing on the safety applications where the vehicles involve in broadcasting the safety messages that are highly time critical and reliability sensitive. The importance of delivering the broadcasted safety messages of VANET in highly timely and reliable manner has resulted in undertaking this research work. In order to support the reliable delivery of the broadcasted safety messages, this research has developed a model called Reliable Vector Clustering (RVC) which involves in neighbour node identification, vehicle cluster formation and broadcasting the coded data using the network coding method. In order to evaluate this developed model, analytical model developed and simulation studies have been carried out in this report. The analytical model has developed a criterion that helps in choosing the best vehicle as the cluster head node and the simulation studies have compared the effectiveness of the developed method. These simulation studies have revealed the effectiveness of proposed RVC method in improving the packet error recovery probability and packet delivery ratio when compared to the existing methods.
    • The modified k-means algorithm and its application to type-1 diabetes glucose data clustering

      Dai, Jin (University of Bedfordshire, 2010-11)
      Most of previous studies of were concentrated on data mining algorithms for type 2 diabetes patients. This study aims to design and implement a data mining algorithm to assist doctors to diagnose and analyze type 1 diabetes patients' condition. In order to achieve the aim of this study, data of glucose of the diabetes patients have been collected first. Mainstream data mining algorithms have been then studied and compared through literatures review. A K-means algorithm has been initially selected to be applied to deal with diabetes patients' data. However, there are three disadvantages of the K-means algorithm: a) The performance of the K-means algorithm tightly relies on the order of input data. b) Outliers can determine the performance of the algorithm. c) The data samples which fall into the overlap are difficult to deal with. Therefore, fuzzy logic techniques have been introduced to collaboratively work with the K-means algorithm. Experiments are to be carrying out in order to test and verify the proposed algorithm after the implementation of the software. The proposed algorithm and the software are going to be optimized in the nearly future.
    • Motivating scientific knowledge workers: an investigation of the rewards leading to the motivation of scientific knowledge workers

      Edginton, Joanne (University of Bedfordshire, 2012-10)
      Numerous studies have been previously conducted, investigating motivation and the role of rewards as motivators for knowledge workers. While many studies have investigated knowledge workers, the scientific knowledge worker group has attracted little attention. Through a survey carried out on 132 scientific knowledge workers employed in a Research and Development function, this study identifies which rewards motivate this group of knowledge workers and investigates the differences of reported motivation from these rewards between the different demographics of the respondents. The results from this study highlight that there are inconsistencies in reported motivations between the different demographics surveyed, namely gender, age and educational background. This study also discovers that scientific knowledge workers are most motivated by financial rewards, progression, job title and recognition. These findings recommend that further research is required to fully understand the rewards leading to the motivation of scientific knowledge workers and the difference in demographics. It is also recommended that businesses employing scientific knowledge workers recognise the importance of these factors in motivating their employees, in order to ensure motivation, job satisfaction and high performance, thus leading to a competitive advantage.
    • Myo-Electric Sensor system for precise robot control

      Rana, Khaqan-Jim (University of Bedfordshire, 2019-11)
      Robotic prosthetics has been a field of great interest in recent years and much work has been conducted in the various disciplines that it consists of. Among these disciplines is the research on sensor technology which used to enable control of such prosthesis through muscle activation. Responsiveness and accuracy is vital to implement a functional sensor system for prosthesis, as such this thesis will present the research and development of a sensor system used to control a robotic prosthesis as well as a feedback system which compares the position of the robot fingers and the intended movement in order to correct the servo motor position. These sensor systems are developed to produce precise robot control of prostheses without causing amplification errors. The research will discuss the suitability of different sensors for the sensing of the muscle activity of the user and sensors for the development of the feedback system and describe their implementation and processing. In addition to this, different configuration of sensors and code will be employed and compared, so that the most suitable configuration is found, which is the configuration that is responsive to the muscle activation of the user, eliminates noise and prevents amplification errors, and enables movement of analogue manner rather than digital in order to create a natural feeling control of a prosthesis which imitates the intention of the user. Furthermore, the cost of commercially available robotic prostheses are expensive, making it inaccessible to lower-income users and people within conflict zones who are in need of such technology, thus the research will focus on using inexpensive components and material to lower the production costs in order to raise the accessibility of robotic prostheses to people in conflict zones and countries of low income. This research shows that the implementation of the proposed sensor system and feedback system indeed enables analogue mannered, responsive and accurate control of a robotic hand while preventing amplification errors, and the use of commonly available components and low-cost material is a viable option.
    • Nanoparticles based drug delivery platform to improve oral uptake for the treatment of Alzheimer’s disease

      Kaur, Gurpreet (University of Bedfordshire, 2020)
      Alzheimer’s disease (AD) is a rapidly progressive chronic neurodegenerative disease, which eventually leads to brain damage. Despite combined efforts of the research community, no fully effective treatment has been identified yet. Drug delivery is a major issue in neurodegenerative diseases due to the complexity of the diseases but the difficulty in accessing targets. A medicine is only effective if it reaches its target. As such, while some active molecules can be demonstrated very efficiently in vitro, side effects and unreachable targets bring delivery at the forefront of drug efficiency. Rivastigmine is one of the reversible Acetylcholinesterase (AChE) Inhibitors, which is used for the treatment of mild to moderate dementia of either AD or Parkinson’s disease (PD). As a cholinesterase inhibitor, its role is to inhibit AChE activity to maintain ACh level by decreasing its breakdown rate, therefore boosting cholinergic neurotransmission in forebrain regions and compensate for the loss of functioning brain cells Rivastigmine has shown some success in improving ACh level in AD patients and also inhibiting amyloid plaques deposition in the brain. It is commercially available in different forms including oral solutions, tablets, and patches but therapeutic regimens require frequent dosing causing fluctuations is the plasma level. Whereas the oral form has been associated with a high incidence of gastrointestinal side effects, the transdermal patch formulation has been shown to have a better tolerability profile but adverse dermatologic reactions remain a concern. In addition, an important safety concern persists with dermal application with the risk of treatment overdose by administering multiple patches at the same time, potentially leading to fatal outcomes. Therefore, the oral form could be safer if its side effects could be controlled. Following initial uptake, crossing the blood-­‐brain barrier (BBB) is another major obstacle to be considered. Due to its hydrophilic nature, rivastigmine efficacy is also restricted by its poor ability to cross BBB. Its bioavailability is reported to be only up to 35%. To overcome these issues, this work has focused on the delivery of rivastigmine, particularly its uptake with nanoparticle-­‐based formulations that can facilitate uptake, protect the active molecule from early degradation, and provide targeted delivery while preventing side effects due to unwanted interactions. Rivastigmine loaded nanoparticles have previously been designed and proven to have numerous fundamental properties that assist their effectiveness such as biocompatibility, lack of toxicity, reduced side effects, and increased tolerated dose of the drug but not effective enough for the treatment. Their enhanced retention time within the systemic circulation and their ability to cross BBB still remains challenging. The novel formulations designed in this study were designed for slow release to prevent cytotoxicity while providing stability and high uptake in GI tract to reach the systemic circulation. Biodegradable composition of these formulations will prevent the risks that may contribute to accumulation of inorganic material inside the brain. As the aim of the research is the successful targeted delivery of Rivastigmine, the first objective of this study was to design an efficient method to monitor and analyse delivery, using UPLC in an analytical set up standardised using in house developed standard solutions. In the second part of this study, several formulations were designed and investigated to improve rivastigmine intestinal uptake, where both negatively and positively charges drug loaded nanoparticles were formulated. In the third part of this work ,a Caco-­‐2 cell duodenal model was used to assess membrane permeability, uptake, and intake of Rivastigmine. Cytotoxicity of nanoformulations was determined by MTT assay showing low toxicity in the case of rivastigmine-­‐loaded nanoparticles. The final results of this study demonstrate that nanoparticle formulations provide a slower stable release of rivastigmine from nanoparticles than previously designed nanoformulations. I addition, some of these formulations provide high bioavailability over both apical and basal membrane, therefore, providing higher intake to target the BBB, with limited unwanted interaction in the intestine therefore limiting the major concern about side effects