Objective: The present study was aimed to develop a pH-triggered in situ gel for local release of lidocaine hydrochloride (lidocaine HCL) in the buccal cavity to improve the anesthetic effect of this amino amide drug which has very high water solubility. The formulations were introduced to the oral cavity as a spray to improve compliance and for easier administration.Methods: In this work, two grades of carbopol (934 and 940)-based in situ gel spray were designed. The formulations containing lidocaine HCl 5% were prepared by mixing different concentrations of carbopol with xanthan gum. Eight formulations were investigated and evaluated for gelation capacity, spray angle, volume of solution delivered per each actuation, rheological properties, and release kinetic model. Similarity factor (f2) was used for the comparison of dissolution profiles.Results: The prepared formulations undergo gelation after it had been actuated to the buccal cavity as a spray solution. The results showed that, as the concentration of polymer was increased, the release of drug decreased and the viscosity increased for both grades. The spray angle and volume of solution delivered per each actuation varied according to the composition of each formulation. The in situ gel containing 0.3% carbopol 934 and 0.2% xanthan gum regarded as a better candidate which had a good gelation and release property compared to other formulations. Drug release from optimized in situ gel spray followed Korsmeyer–Peppas model and was mediated by Fickian diffusion mechanism.Conclusion: Lidocaine HCl-loaded pH-sensitive in situ gel was successfully developed using carbopol 934 as polymer to be applied to the buccal cavity as spray solution for more effective anesthetic effect and painless treatment.
Abstract
The goal of the research is to diagnose some of the negative phenomena which was discovered through the period from (2010 to 2014) as determined by the national strategy to eliminate the corruption which was set out by the joint council of the corruption elimination in Iraq. And to measure the gap in applying the legal rules by the administration, concerning the misconducts and felonies upon the state employments made by the state employee and how far they are applied in the studied sample and to show the nature of the rules and their importance and their role when they are applied in scientific and expertise manner. And to encourage the offices of the general supervisors to adhere to them which will lead t
... Show MoreThe current research aims to identify the " impact of strategic warheads numbered ( NHT) in the collection average second grade students in the article of history). " To achieve this, I assumed the researcher that there is no different between the statistically significant the average score for the collection of experimental group who teaches the Arab Islamic history on and a strategic warheads numbered and the average score for the collection of the control group who were studying the same article according to the classic method ( traditional) . The study sample consisted of 64 students from the second grade average in the secondary warka bin nawfal in the general Directorate for education first karkh in Baghdad for the annual cources 2
... Show More
The sciences related to the Book of God are many, and the benefits of every science in it are abundant, and among those sciences is the science of readings, which is for the sake of science and the most honorable, due to its strong attachment to the Book of God Almighty. From this care, and aims to show the attention of scholars to the science of readings in general and the scholars of the fifth century in particular, as the literature on it abounded until it became the principal for those who came after them.
The research consists of an introduction that includes the objectives of the research, the reasons for choosing it, previous studies, research questions, and research terms, then a preface dealing with the im
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .