Preferred Language
Articles
/
7xc3kpIBVTCNdQwCSrdB
Preparation, <i>In-vitro, Ex-vivo</i>, and Pharmacokinetic Study of Lasmiditan as Intranasal Nanoemulsion-based <i>In Situ</i> Gel
...Show More Authors
Background:

Lasmiditan (LAS) is a recently developed antimigraine drug and was approved in October, 2019 for the treatment of acute migraines; however, it suffers from low oral bioavailability, which is around 40%.

Objective:

This study aimed to improve the LAS bioavailability via formulation as nanoemulsionbased in situ gel (NEIG) given intranasally and then compare the traditional aqueous-LASsuspension (AQS) with the two successful intranasal prepared formulations (NEIG 2 and NEIG 5) in order to determine its relative bioavailability (F-relative) via using rabbits.

Method:

Two successfully prepared nanoemulsion (NE) formulas, a and b, were selected for the incorporation of different percentages of pH-sensitive in situ gelling polymer (Carbopol 934) to prepare NEIGs 1, 2, 3, 4, 5, and 6. The pH, gelation capacity, gel strength, and viscosity were predicted for the prepared NEIGs. The release (in vitro) and the nasal permeation (ex vivo) were determined for NEIG 2 and 5, and then both were subjected to pharmacokinetics in vivo studies. Eighteen male rabbits weighing 2.0 to 2.5 kg were employed in the parallel design study. The body surface area (BSA) normalization method was applied for LAS dose calculation. Serial blood samples were taken out and subjected to drug analysis using the HPLC method previously developed and validated by Kumar et al. Primary pharmacokinetics parameters, including maximum drug concentration in plasma (Cmax), time to reach C-max (T-max), and area under the concentration-time curve from time zero to affinity (AUCt0-∞) were calculated. Both NE (a and b), together with NEIG (2 and 5) formulas, were subjected to the stability study. Finally, a nasal ciliotoxicity study was carried out to evaluate the nasal toxicity of developed NEIGs 2 and 5.

Result:

The results showed that NEIGs 2 and 5 could be selected as the optimized NEIGs as both achieved 100% permeation within 20 min and then released within 25 and 35 min, respectively, thus achieving 3.3 folds with higher permeation percentages as compared to the AQS. Both NEIGs 2 and 5 exerted comparable release and permeation values as the corresponding NE a and b with more residence time in order to overcome the normal nasal physiological clearance. The values of C-max, Tmax, and AUC0- ∞ for NEIG 2 and NEIG 5 were 8066 ± 242 ng/ml, 0.75 ± 0.05 h, 19616.86 ± 589 ng. h/ml, and 7975.67 ± 239 ng/ml, 1.0 ± 0.05 h, 17912.36 ± 537 ng. h/ml, respectively, compared to the traditional AQS, which is equal to 4181.09 ± 125 ng/ml, 2 ± 0.2 h, and 8852.27 ± 266 ng. h/ml, respectively. It was discovered that NEIGs 2 and 5 had better intranasal delivery of LAS and could significantly (p < 0.05) achieve a higher value of permeability coefficient (3.3 folds) and 2.5 folds improvement in bioavailability when compared to AQS. The NE a, NE b, NEIG2, and NEIG5 formulations showed good stability at various temperatures. According to the nasal ciliotoxicity study, the nasal mucosal membrane, which was treated with NEIG 5, showed irritation with a bit of damage. However, damage was not observed when it was treated with NEIG 2, indicating the biocompatibility of the last one to be selected as the optimum formula.

Conclusion:

NEIG 2 and NEIG 5 are promising new intranasal formulas with a faster onset of action and greater bioavailability than the oral dosage form (AQS). Finally, the selected optimum gold formula that will be ready for further clinical study is NEIG 2.

Scopus Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jan 14 2023
Journal Name
Cogent Engineering
C. B interrupt duty reduction based controlling TRV and symmetrical breaking current
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 21 2021
Journal Name
Journal Of Healthcare Engineering
Complexity and Entropy Analysis to Improve Gender Identification from Emotional-Based EEGs
...Show More Authors

Investigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

View Publication
Scopus (42)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine
...Show More Authors

View Publication
Scopus (29)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (40)
Crossref (31)
Scopus Crossref