Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting ADR.
This paper is an applied study of the temporal meaning of structure, to assess the strength of time-dependent expressions as a framework for the action or verb
Charge transfer complex formation method has been applied for the spectrophotometric determination of cimetidine, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3-Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (5.0 - 50.0) µg.mL-1 with detection limit of 0.268µg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of cimetid
... Show MoreBackground: Frovatriptan succinate (FVT) is an effective medication used to treat migraines; however, available oral formulations suffer from low permeability; accordingly, several formulations of FVT were prepared. Objective: Prepare, optimize, and evaluate FVT-BE formulation to develop enhanced intranasal binary nano-ethosome gel. Methods: Binary ethosomes were prepared using different concentrations of phospholipid PLH90, ethanol, propylene glycol, and cholesterol by thin film hydration and characterized by particle size, zeta potential, and entrapment efficiency. Furthermore, in-vitro, in-vivo, ex-vivo, pharmacokinetics, and histopathological studies were done. Results: Regarding FVT-loaded BE, formula (F9) demonstrated the best paramet
... Show MoreNeutral and semi-synthetic hydrophilic polymers are widely used
in pharmaceutical technology to fomlUlate as controlled release drugs
delivery systems ,cellulose derivatives is biocompatibilily, biodegradability , non-toxicity, its is a good candidate as drug carrier. In this study, polymers were used as cellulose derivatives like Methylcellulose (MC) & Soditun Carboxymetl1ylcellulose (NaCMC) as hydrogels for controlled delivery for two kinds of drugs, Cefotaxine
& Amoxycill ine trihydrate i n different media (Distilled water, Normal Saline & Buffer solution PH=2). It has been shown that for sodium Carboxymethylcellulnse the drug release rate is more than the Mcthylcellulose and that the release
... Show MoreIn this review of literature, the light will be concentrated on the local drugs delivery systems for treating the periodontal diseases. Principles, types, advantages and indications of each type will be discussed in this paper.
هذه الدراسة مكرسة للخصائص الوظيفية والدلالية المعقدة للفئات اللفظية من التوتر والنوع في اللغة الروسية سيتم الكشف في هذه الدراسة عن السمات الدلالية والأسلوبية للفرق بين الأفعال المكتملة وغير المكتملة، قد تكون الاختلافات مرتبطة بخصائص المعاني المعجمية للكلمات، وكذلك معاني اللواحق المكونة للكلمات) السوابق واللواحق). يعكس استخدام هذه الفئة النحوية في أنماط مختلفة بوضوح تفاصيل كل منها، لأن درجة واقعية ال
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More