Preferred Language
Articles
/
7xc3kpIBVTCNdQwCSrdB
Preparation, <i>In-vitro, Ex-vivo</i>, and Pharmacokinetic Study of Lasmiditan as Intranasal Nanoemulsion-based <i>In Situ</i> Gel
...Show More Authors
Background:

Lasmiditan (LAS) is a recently developed antimigraine drug and was approved in October, 2019 for the treatment of acute migraines; however, it suffers from low oral bioavailability, which is around 40%.

Objective:

This study aimed to improve the LAS bioavailability via formulation as nanoemulsionbased in situ gel (NEIG) given intranasally and then compare the traditional aqueous-LASsuspension (AQS) with the two successful intranasal prepared formulations (NEIG 2 and NEIG 5) in order to determine its relative bioavailability (F-relative) via using rabbits.

Method:

Two successfully prepared nanoemulsion (NE) formulas, a and b, were selected for the incorporation of different percentages of pH-sensitive in situ gelling polymer (Carbopol 934) to prepare NEIGs 1, 2, 3, 4, 5, and 6. The pH, gelation capacity, gel strength, and viscosity were predicted for the prepared NEIGs. The release (in vitro) and the nasal permeation (ex vivo) were determined for NEIG 2 and 5, and then both were subjected to pharmacokinetics in vivo studies. Eighteen male rabbits weighing 2.0 to 2.5 kg were employed in the parallel design study. The body surface area (BSA) normalization method was applied for LAS dose calculation. Serial blood samples were taken out and subjected to drug analysis using the HPLC method previously developed and validated by Kumar et al. Primary pharmacokinetics parameters, including maximum drug concentration in plasma (Cmax), time to reach C-max (T-max), and area under the concentration-time curve from time zero to affinity (AUCt0-∞) were calculated. Both NE (a and b), together with NEIG (2 and 5) formulas, were subjected to the stability study. Finally, a nasal ciliotoxicity study was carried out to evaluate the nasal toxicity of developed NEIGs 2 and 5.

Result:

The results showed that NEIGs 2 and 5 could be selected as the optimized NEIGs as both achieved 100% permeation within 20 min and then released within 25 and 35 min, respectively, thus achieving 3.3 folds with higher permeation percentages as compared to the AQS. Both NEIGs 2 and 5 exerted comparable release and permeation values as the corresponding NE a and b with more residence time in order to overcome the normal nasal physiological clearance. The values of C-max, Tmax, and AUC0- ∞ for NEIG 2 and NEIG 5 were 8066 ± 242 ng/ml, 0.75 ± 0.05 h, 19616.86 ± 589 ng. h/ml, and 7975.67 ± 239 ng/ml, 1.0 ± 0.05 h, 17912.36 ± 537 ng. h/ml, respectively, compared to the traditional AQS, which is equal to 4181.09 ± 125 ng/ml, 2 ± 0.2 h, and 8852.27 ± 266 ng. h/ml, respectively. It was discovered that NEIGs 2 and 5 had better intranasal delivery of LAS and could significantly (p < 0.05) achieve a higher value of permeability coefficient (3.3 folds) and 2.5 folds improvement in bioavailability when compared to AQS. The NE a, NE b, NEIG2, and NEIG5 formulations showed good stability at various temperatures. According to the nasal ciliotoxicity study, the nasal mucosal membrane, which was treated with NEIG 5, showed irritation with a bit of damage. However, damage was not observed when it was treated with NEIG 2, indicating the biocompatibility of the last one to be selected as the optimum formula.

Conclusion:

NEIG 2 and NEIG 5 are promising new intranasal formulas with a faster onset of action and greater bioavailability than the oral dosage form (AQS). Finally, the selected optimum gold formula that will be ready for further clinical study is NEIG 2.

Scopus Crossref
View Publication
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
Heuristic Initialization And Similarity Integration Based Model for Improving Extractive Multi-Document Summarization
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis of new derivatives of Ceftazidime as possible Prodrugs
...Show More Authors

Five new ceftazidime derivatives were designed and synthesized in an attempt to improve the acid stability and may increase the spectrum of ceftazidime. The synthesized compounds included;  Schiff base of ceftazidime (compound 1), ceftazidime lysine amide Schiff base (compound 2), ceftazidime lysine amide (compound 3), ceftazidime-di-lysine amide Schiff base (compound 4) and ceftazidime-di-lysine amide (compound 5). New ceftazidime derivatives were successfully prepared characterized and identified using spectral and elemental microanalysis (CHNS) analyses and the results comply with the calculated measurements.

Compounds 1 and 2 were subjected to a stability study in phosphate buffer (0.2M, pH 7.4) and in KCl/HCl buffer (0.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref