Preferred Language
Articles
/
7xc3kpIBVTCNdQwCSrdB
Preparation, <i>In-vitro, Ex-vivo</i>, and Pharmacokinetic Study of Lasmiditan as Intranasal Nanoemulsion-based <i>In Situ</i> Gel
...Show More Authors
Background:

Lasmiditan (LAS) is a recently developed antimigraine drug and was approved in October, 2019 for the treatment of acute migraines; however, it suffers from low oral bioavailability, which is around 40%.

Objective:

This study aimed to improve the LAS bioavailability via formulation as nanoemulsionbased in situ gel (NEIG) given intranasally and then compare the traditional aqueous-LASsuspension (AQS) with the two successful intranasal prepared formulations (NEIG 2 and NEIG 5) in order to determine its relative bioavailability (F-relative) via using rabbits.

Method:

Two successfully prepared nanoemulsion (NE) formulas, a and b, were selected for the incorporation of different percentages of pH-sensitive in situ gelling polymer (Carbopol 934) to prepare NEIGs 1, 2, 3, 4, 5, and 6. The pH, gelation capacity, gel strength, and viscosity were predicted for the prepared NEIGs. The release (in vitro) and the nasal permeation (ex vivo) were determined for NEIG 2 and 5, and then both were subjected to pharmacokinetics in vivo studies. Eighteen male rabbits weighing 2.0 to 2.5 kg were employed in the parallel design study. The body surface area (BSA) normalization method was applied for LAS dose calculation. Serial blood samples were taken out and subjected to drug analysis using the HPLC method previously developed and validated by Kumar et al. Primary pharmacokinetics parameters, including maximum drug concentration in plasma (Cmax), time to reach C-max (T-max), and area under the concentration-time curve from time zero to affinity (AUCt0-∞) were calculated. Both NE (a and b), together with NEIG (2 and 5) formulas, were subjected to the stability study. Finally, a nasal ciliotoxicity study was carried out to evaluate the nasal toxicity of developed NEIGs 2 and 5.

Result:

The results showed that NEIGs 2 and 5 could be selected as the optimized NEIGs as both achieved 100% permeation within 20 min and then released within 25 and 35 min, respectively, thus achieving 3.3 folds with higher permeation percentages as compared to the AQS. Both NEIGs 2 and 5 exerted comparable release and permeation values as the corresponding NE a and b with more residence time in order to overcome the normal nasal physiological clearance. The values of C-max, Tmax, and AUC0- ∞ for NEIG 2 and NEIG 5 were 8066 ± 242 ng/ml, 0.75 ± 0.05 h, 19616.86 ± 589 ng. h/ml, and 7975.67 ± 239 ng/ml, 1.0 ± 0.05 h, 17912.36 ± 537 ng. h/ml, respectively, compared to the traditional AQS, which is equal to 4181.09 ± 125 ng/ml, 2 ± 0.2 h, and 8852.27 ± 266 ng. h/ml, respectively. It was discovered that NEIGs 2 and 5 had better intranasal delivery of LAS and could significantly (p < 0.05) achieve a higher value of permeability coefficient (3.3 folds) and 2.5 folds improvement in bioavailability when compared to AQS. The NE a, NE b, NEIG2, and NEIG5 formulations showed good stability at various temperatures. According to the nasal ciliotoxicity study, the nasal mucosal membrane, which was treated with NEIG 5, showed irritation with a bit of damage. However, damage was not observed when it was treated with NEIG 2, indicating the biocompatibility of the last one to be selected as the optimum formula.

Conclusion:

NEIG 2 and NEIG 5 are promising new intranasal formulas with a faster onset of action and greater bioavailability than the oral dosage form (AQS). Finally, the selected optimum gold formula that will be ready for further clinical study is NEIG 2.

Scopus Crossref
View Publication
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Journalism of Paper Newspapers in Light of the Competition of the Electronic Press / (A Field Study of Yemeni Daily Newspapers)
...Show More Authors

The researcher seeks to get scientific facts through knowing the relationship between the priorities of Yemeni audience in follow-up paper daily newspapers compared to surfing publics the online journalism sites and the nature of information obtained from online journalism sites and printed paper newspapers and the impact of the daily newspapers in the priority of issues and political events among a sample of a group of Yemeni readers in order to identify the extent to keep up the paper daily newspapers of the development in the field of online journalism and the extent of reading paper newspapers under the intense competition by online journalism sites, and are paper newspapers able to keep pace with the actual developments provided by

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the cost of consulting services under the traditional cost approach and the performance-based costing technique and its impact on achieving profits : Applied research in the advisory office of Al-Khwarizmi College of Engineering - University of Baghdad
...Show More Authors

Abstract:

                    This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Improving Barcode Vision Scanning Process using a Drone-based Tracking PID Controller for Warehouse in Industry 4.0
...Show More Authors

Drones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref