Improved oral bioavailability of lipophilic substances can be achieved using self-emulsifying drug delivery systems. However, because the properties of self-emulsifying are greatly influenced by surfactant amount and type, type of oil used, droplet size, charge, cosolvents, and physiological variables, the synthesis of self-emulsifying is highly complex; consequently, only a small number of excipient self-emulsifying formulations has been developed so far for clinical use. This study reports a highly effective procedure for developing self-emulsifying formulations using a novel approach based on the hydrophilic-lipophilic difference theory. Microemulsion characteristics, such as the constituents and amounts of oil and surfactant electrolyte concentration and temperature, were optimized to produce high-quality self-emulsifying drug delivery systems. Furthermore, in vitro lipolysis and in vivo bioavailability studies of fenofibrate, a highly lipophilic oral drug, loaded self-emulsifying dosage form were conducted. The self-emulsifying drug delivery system used in this study comprised soybean oil, water with a specific salinity, sodium dioctyl sulphosuccinate as a surfactant, and orlistat as a lipase inhibitor. The hydrophilic-lipophilic difference-based approach involved fewer experiments and allowed for the development of an efficient self-emulsifying dosage form with a relatively low surfactant concentration when compared to previous works. The salinity and equivalent alkane carbon number were optimized, with the proper selection of the type and amount of surfactant, to obtain a bicontinuous microemulsion (Winsor type III) that can be fully diluted with water. In vitro lipolysis was investigated in fasting and feeding settings, which showed a significant dosage form digestion by lipase enzyme; orlistat was successfully used to overcome dosage digestion and drug precipitation problem. In vivo experiments in rats involved oral gavage with a self-emulsifying dosage form containing fenofibrate (20 mg/kg). The pharmacokinetic profile of fenofibric acid showed remarkable enhancement in the bioavailability (F-95%). These findings demonstrate that the hydrophilic-lipophilic difference approach is a practical, scalable, and easy technique for self-emulsifying drug delivery system formulation development. Keywords: HLD theory, fenofibrate, SEDDS, lipolysis
Hygienic engineering has dedicated a lot of time and energy to studying water filtration because of how important it is to human health. Thorough familiarity with the filtration process is essential for the design engineer to keep up with and profit from advances in filtering technology and equipment as the properties of raw water continue to change. Because it removes sediment, chemicals, odors, and microbes, filtration is an integral part of the water purification process. The most popular technique for treating surface water for municipal water supply is considered fast sand filtration, which can be achieved using either gravity or pressure sand filters. Predicting the performance of units in water treatment plants is a basic pri
... Show MoreAbstract: E2F6 is a member of the E2F family of transcription factors involved in regulation of a wide variety of genes through both activation and repression. E2F6 has been reported as overexpressed in breast cancers but whether or not this is important for tumor development is unclear. We first checked E2F6 expression in tumor cDNAs and the protein level in a range of breast cancer cell lines. RNA interference-mediated depletion was then used to assess the importance of E2F6 expression in cell lines with regard to cell cycle profile using fluorescence-activated cell sorting and a cell survival assay using (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT). The overexpression of E2F6 was confirmed in breast tumor cDNA samp
... Show MoreInnovative laboratory research and fluid breakthroughs have improved carbonate matrix stimulation technology in the recent decade. Since oil and gas wells are stimulated often to increase output and maximum recovery, this has resulted in matrix acidizing is a less costly alternative to hydraulic fracturing; therefore, it is widely employed because of its low cost and the fact that it may restore damaged wells to their previous productivity and give extra production capacity. Limestone acidizing in the Mishrif reservoir has never been investigated; hence research revealed fresh insights into this process. Many reports have stated that the Ahdeb oil field's Mishrif reservoir has been unable to be stimulated due to high inj
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
A range of macrocyclic dinuclear metal (II) dithiocarbamate-based complexes are reported. The preparation of complexes was accomplished from either mixing of the prepared ligand with a metal ion or through a template one-pot reaction. The preparation of the bisamine precursor was achieved through several synthetic steps. The free ligand; potassium 2,2'-(biphenyl-4,4'-diylbis(azanediyl))bis(1-chloro-2-oxoethane-2,1diyl)bis(cyclohexylcarbamodithioate) (L) was yielded from the addition of CS2 to a bis-amine precursor in KOH medium.A variety of analytical and physical methods were implemented to characterise ligand and its complexes. The analyses were based on spectroscopic techniques (FTIR, UV-Vis, mass spectroscopy and 1H, 13C-NMR sp
... Show MoreIn this work, the dynamic behavior of discrete models is analyzed with Beverton- Holt function growth . All equilibria are found . The existence and local stability are investigated of all its equilibria.. The optimal harvest strategy is done for the system by using Pontryagin’s maximum principle to solve the optimality problem. Finally numerical simulations are used to solve the optimality problem and to enhance the results of mathematical analysis
Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreThe current search aims to identify First: To measure the level of authoritarian personality among the students of the sample as a whole. Second: Measurement of differences in the level of authoritarian personality among students in the middle school according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Third: the level of control site level among the students of the sample as a whole. Ra'aa: Measurement of differences in the level of the control site among junior students according to the following variables 0.Science (literary, scientific) 8. Sex (male - female) Fifth: Explain the relationship between the authoritarian personality and the locus of control among the students of the research sample.
... Show MoreIn recent years, with the growing size and the importance of computer networks, it is very necessary to provide adequate protection for users data from snooping through the use of one of the protection techniques: encryption, firewall and intrusion detection systems etc. Intrusion detection systems is considered one of the most important components in the computer networks that deal with Network security problems. In this research, we suggested the intrusion detection and classification system through merging Fuzzy logic and Artificial Bee Colony Algorithm. Fuzzy logic has been used to build a classifier which has the ability to distinguish between the behavior of the normal user and behavior of the intruder. The artificial bee colony al
... Show MoreImportance of study :
The interesting of industrial sector and developing it after corner stone. It is important to build economic balanced and get behind and front linkage for transformative industrials, and this is important to get balanced.
The value of transformative industry sector is more important than other sectors in economy, and this is reflect the capital in industrial sector .Industry sector is larger than other sectors ,so it regards the motive which moving the economic wheel .
The problem :
The research treats reduction and retreat the ind
... Show More