Olanzapine (OLZ) is classified as a typical antipsychotic drug utilized for the treatment of schizophrenia. Its oral bioavailability is 60% due to its low solubility and pre-systemic metabolism. Hence, the present work aims to formulate and evaluate OLZ nanoparticles dissolving microneedles (MNs) for transdermal delivery to overcome the problems associated with drug administration orally. OLZ nanoparticles were prepared by the nanoprecipitation method. The optimized OLZ nanoparticle formula was utilized for the fabrication of dissolving MNs by loading OLZ nanodispersion into polydimethylsiloxane (PDMS) micromould cavities, followed by casting the polymeric solution of polyvinylpyrrolidone(PVP-K30) and polyvinyl alcohol (PVA) to form MN matrix. The results revealed that the optimized OLZ nanoparticle formula (NP-5) exhibited particle size 115.76±5.45 nm, entrapment efficiency 78.4±5.46, and zeta potential -19.01±1.6 mV. The results of MNs revealed that MN-4 exhibits a high drug content of 98.52%, and ex vivo permeation through rabbit skin exhibited that MN-4 permeates more effectively than a simple patch by approximately 5.16 fold. In vivo pharmacokinetics study revealed that the area under curve AUC 0-∞ of MN-4 was 6054.56±376 ng. h/ml as compared with AUC0-∞ of marketed OLZ tablet was 3975.77±373 ng. h/ml. It can be concluded that the dissolving MN-4 patch is considered a promising formula to overcome the problems associated with drug administration orally and could improve drug bioavailability, in addition to the ease of administering the medication to schizophrenic patients.
The Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe current research is concerned with the prices of Goods and materials in the Iraqi slang a descriptive, lexicographic , and semantic study expressing the meanings of these names and their positions , as well as expressing the imaginations of Human mind , the popular mind in describing these goods with evaluating them besides the semantic of each word accordingly
The current research is divided into two parts , the first part is consisted of Vocalizations" words" That are arisen through cognitive naming that concentrate on the mental imaginations for the most important and sensitive such as colors , taste , shapes and forms impacts of Goods and materials according to users' ' taste for those words , on other hand, the second part of
Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreBackground: Coronavirus disease 2019 (COVID-19) is
one of the updated challenges facing the whole world.
Objective: To identify the characteristics risk factors that
present in humans to be more liable to get an infection
than others.
Methods: A cross-sectional study was conducted for
positively confirmed 35 patients with polymerase chain
reaction in Wasit province at AL-Zahraa Teaching
Hospital from the period of March 13th till April 20th. All
of them full a questionnaire regarded by risk factors and
other comorbidities. Data were analyzed by SPSS version
23 using frequency tables and percentage. For numerical
data, the median, and interquartile range (IQR) were used.
Differences between categoric
Mercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More