Preferred Language
Articles
/
7xc3kpIBVTCNdQwCSrdB
Preparation, <i>In-vitro, Ex-vivo</i>, and Pharmacokinetic Study of Lasmiditan as Intranasal Nanoemulsion-based <i>In Situ</i> Gel
...Show More Authors
Background:

Lasmiditan (LAS) is a recently developed antimigraine drug and was approved in October, 2019 for the treatment of acute migraines; however, it suffers from low oral bioavailability, which is around 40%.

Objective:

This study aimed to improve the LAS bioavailability via formulation as nanoemulsionbased in situ gel (NEIG) given intranasally and then compare the traditional aqueous-LASsuspension (AQS) with the two successful intranasal prepared formulations (NEIG 2 and NEIG 5) in order to determine its relative bioavailability (F-relative) via using rabbits.

Method:

Two successfully prepared nanoemulsion (NE) formulas, a and b, were selected for the incorporation of different percentages of pH-sensitive in situ gelling polymer (Carbopol 934) to prepare NEIGs 1, 2, 3, 4, 5, and 6. The pH, gelation capacity, gel strength, and viscosity were predicted for the prepared NEIGs. The release (in vitro) and the nasal permeation (ex vivo) were determined for NEIG 2 and 5, and then both were subjected to pharmacokinetics in vivo studies. Eighteen male rabbits weighing 2.0 to 2.5 kg were employed in the parallel design study. The body surface area (BSA) normalization method was applied for LAS dose calculation. Serial blood samples were taken out and subjected to drug analysis using the HPLC method previously developed and validated by Kumar et al. Primary pharmacokinetics parameters, including maximum drug concentration in plasma (Cmax), time to reach C-max (T-max), and area under the concentration-time curve from time zero to affinity (AUCt0-∞) were calculated. Both NE (a and b), together with NEIG (2 and 5) formulas, were subjected to the stability study. Finally, a nasal ciliotoxicity study was carried out to evaluate the nasal toxicity of developed NEIGs 2 and 5.

Result:

The results showed that NEIGs 2 and 5 could be selected as the optimized NEIGs as both achieved 100% permeation within 20 min and then released within 25 and 35 min, respectively, thus achieving 3.3 folds with higher permeation percentages as compared to the AQS. Both NEIGs 2 and 5 exerted comparable release and permeation values as the corresponding NE a and b with more residence time in order to overcome the normal nasal physiological clearance. The values of C-max, Tmax, and AUC0- ∞ for NEIG 2 and NEIG 5 were 8066 ± 242 ng/ml, 0.75 ± 0.05 h, 19616.86 ± 589 ng. h/ml, and 7975.67 ± 239 ng/ml, 1.0 ± 0.05 h, 17912.36 ± 537 ng. h/ml, respectively, compared to the traditional AQS, which is equal to 4181.09 ± 125 ng/ml, 2 ± 0.2 h, and 8852.27 ± 266 ng. h/ml, respectively. It was discovered that NEIGs 2 and 5 had better intranasal delivery of LAS and could significantly (p < 0.05) achieve a higher value of permeability coefficient (3.3 folds) and 2.5 folds improvement in bioavailability when compared to AQS. The NE a, NE b, NEIG2, and NEIG5 formulations showed good stability at various temperatures. According to the nasal ciliotoxicity study, the nasal mucosal membrane, which was treated with NEIG 5, showed irritation with a bit of damage. However, damage was not observed when it was treated with NEIG 2, indicating the biocompatibility of the last one to be selected as the optimum formula.

Conclusion:

NEIG 2 and NEIG 5 are promising new intranasal formulas with a faster onset of action and greater bioavailability than the oral dosage form (AQS). Finally, the selected optimum gold formula that will be ready for further clinical study is NEIG 2.

Scopus Crossref
View Publication
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Reinforcement Learning-Based Television White Space Database
...Show More Authors

Television white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (23)
Scopus Crossref
Publication Date
Sun May 15 2022
Journal Name
Revistabionatura
Synthesis and characterization of azo liquid crystal compounds based on 5H-Thiazolo [3,4-b][1,3,4] thiadiazole unit
...Show More Authors

A calamitic symmetric liquid crystalline consisting of an azo group containing 5H-Thiazolo[3,4-b][1,3,4]thiadiazole moiety compound[III] was synthesized via sequence reactions starting from reaction terephthaldehyde with mercaptoacetic acid and thiosemicarbazide in the presence of concentrated sulfuric acid to synthesized 5,5'-(1,4-phenylene)bis(5Hthiazolo[4,3-b][1,3,4]thiadiazol-2-amine)[I] then the azo compound [II] synthesized by coupling between diazonium salt of the compound [I] with phenol at (0-4) ̊C., after that the compound [III] was synthesized by the reaction of the compound [II] with methyl bromide in alkaline media. The compounds are characterized by melting points, FTIR and 1HNMR spectroscopy. The mesomorphic behavior was stu

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF