Abstract Bilastine, a second-generation antihistamine, is commonly prescribed for managing allergic rhinoconjunctivitis and urticaria due to its prolonged action. However, its therapeutic potential is constrained by poor water solubility and low oral bioavailability. This study aimed to enhance bilastine dissolution and patient compliance by formulating a nanosuspension-based orodispersible film (ODF). An anti-solvent precipitation method was employed to produce nanosuspension using different hydrophilic stabilizers (Soluplus®, Poloxamer 188, and PEG 6000). The influence of formulation parameters, such as the stabilizer ratio, the anti-solvent ratio, stirring speed, and the stabilizer type, on particle size and polydispersity index (PDI) was optimized using an experimental design approach. The optimal formulation, with a 1:1 stabilizer-to-drug ratio using Soluplus®, a 6:1 anti-solvent to solvent ratio, and a stirring rate of 820 rpm, yielded nanoparticles with a mean particle size of 83.8 nm and a narrow PDI of 0.019. This formulation also significantly enhanced the drug's dissolution rate in phosphate buffer pH 6.8, releasing 92.02% of bilastine within 90 minutes. Further characterization of the lyophilized nanoparticles using FESEM, FTIR, and XRD, confirmed their amorphous nature and drug compatibility. The optimized nanosuspension was subsequently incorporated into ODFs via the solvent-casting technique, with the optimal film formulated with a 1:1 ratio of PVA and HPMC E5 as the film-forming polymers, demonstrating a rapid disintegration time of 18 seconds and releasing 93.16% of bilastine within 6 minutes. These results confirm the successful formulation of bilastine into ODFs, significantly improving its dissolution compared to the pure drug.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreLithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric
Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreThis study aims to recognize the most common thinking styles and level of the need for cognitive university students , the relation between thinking styles and the need for cognitive, and there are differences according to gender .The sample consists of (250) males and females university students for the academic year (2013-2014), and the researcher uses two scales;" thinking styles scale (Harison &Bramson, 1986), and the need for cognitive scale" (Cacioppo, Petty & Kao , 1996).
The results show that there is difference in the range of the prevalence of the thinking styles among university students , the scientific thinking style is the most common , the students have got the arrange level of the need for cognitive , and there