Search or add a thesis

Advanced Search (Beta)
Home > Fabrication, Design and Evaluation of Controlled Release Matrix Tablets of Selected Nsaids by Using Eudragit Polymers As Rate Controlling Agents

Fabrication, Design and Evaluation of Controlled Release Matrix Tablets of Selected Nsaids by Using Eudragit Polymers As Rate Controlling Agents

Thesis Info

Access Option

External Link

Author

Sattar Bakhsh Awan

Program

PhD

Institute

Gomal University

City

Dera Ismail Khan

Province

KPK

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Subject

Applied Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/6648/1/01_Combine.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676726193118

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The main objective of this research task was to accomplish successfully development of the controlled release matrices of Flurbiprofen and ibuprofen. These both are typical members of NSAID’s and offer considerable therapeutic effects to relieve the symptoms and subsequent management of chronic inflammatory disorders such as osteoarthritis, Rheumatoid arthritis, ankylosing spondylitis and dysmenorrhea. Eudragit polymers were employed as rate controlling agents and consequently, their obvious impact on kinetic, mechanism and pattern of drug release was investigated. This highly skillful task did require primarily, initial preformulation studies to rule out drug identification, as well as solubility profiles. The drug and polymer as well as drug, polymer and co excipients compatibilities were also seriously addressed. Different codes were used to produce a set of formulations involving Eudragit L 100, L 55 and S 100 respectively by employing different drug to polymer ratios for both Flurbiprofen as well as Ibuprofen without any further addition of co-excipients. Moreover, same formulations were also developed in which primary filler (lactose) was partially replaced with co–excipients such as starch, CMC, HPMC, Gum Acacia and Gum tragacanth respectively. Ultimately the impact of these co–excipients upon drug release from fabricated matrices was also noted. Official procedures were employed to describe the Micromeritics studies of pure drugs a s well as respective physical mixtures of the formulation. The results provided puzzling statements about the flow of the pure drugs describing poor flow behavior. This problem was rectified by developing physical mixtures of different ingredients including magnesium stearate as a result, an enhanced and improved flow properties were exhibited. This was indispensable and prominent step in tablet preparation. Direct compression method was adopted as preferred procedure to get matrix tablets. Matrix tablets formed under such a tidy situation under go physico-chemical assessment according to official procedures. These test protocols included dimensional, friability, hardness, weight variation and content uniformity tests. All these searching checks were within official limits. In–vitro dissolution tests were performed for matrix tablets by selecting rotating basket method (USP method 1) with ix phosphate buffer of PH 7.4 as recommended dissolution medium. Matrices having Eudragit L- 100 enhanced the drug release more efficiently as compared to other grades. The leading factors affecting rates and kinetics of drug release from matrices included particle size, drug to polymer ratio and viscosity grades. Various co–excipients incorporated due to progressive replacement of lactose (Primary filler) such as CMC, HPMC, Starch, Gum Acacia and Gum Tragacanth caused enhanced drug release i.e within 3-5 hours. Different kinetic models were fitted to the data of drug release from the matrices. Korseymerpeppas equation best fitted the release profile from matrices by giving “n” value that described anomalous non fickian release mechanism for formulations without co-excipients. The similarity factor (f2) was also determined by comparing dissolution profile of both matrices and conventional dosage forms. The optimized formulations of both drugs were selected by keeping in view description of kinetic models as well as in-vitro dissolution profiles. The optimized formulations were subjected to stability testing in accelerated condition for short term exposure and they offered good stability profiles in accelerated conditions. The optimized tablets were also selected for in-vivo studies to determine in-vivo bioavailability and pharmacokinetic parameters in rabbits. The result deduced, showed test formulation to display extended drug release as compared to reference formulations. Also the test formulations portrayed good linear relationship between in-vitro drug release and in-vivo drug absorption.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

نولکھی کوٹھی

نولکھی کوٹھی

                ’’نولکھی کوٹھی‘‘علی اکبر ناطق کا ناول ہے۔یہ ناول تاریخ پہ لکھی گئی ایک کہانی ہے کیونکہ تاریخی کہانی ہے اس لیے اس ناول کے سارے کردار روایتی ہیں اور تقسیم ہند پر لکھے جانے والے بے شمار ناولوں میں یہ ممکن نہیں ہے کہ ان کے تاریخی واقعات کو بدلہ جا سکے۔ ناول میں مرکزی حیثیت ولیم کو حاصل ہے جو ایک انگریز ہے۔یہی اس ناول کی خاصیت ہے کہ ولیم جو کہ ایک انگریز ہے اور اپنی اس کوٹھی جس پہ اس ناول کا عنوان ہے’’نولکھی کوٹھی‘‘کا مقیم ہے۔ ہندوستانی کہلوانے اور اس سرزمین سے خود کو جوڑ کر رکھنے کی ان تھک کوشش کرتا رہتا ہے۔جس کیلئے وہ وہاں کے رہائشیوں کے لیے بھی بے شمار ایسی خدمات سر انجام دیتا رہتا ہے جن سے ان کی زندگی میں آسانیاں رہیں لیکن اس کی وطن سے محبت کو اس کی زمین کے لیے خدمت کو ہمیشہ شک کی نظر سے دیکھا جاتا ہے۔’’ولیم‘‘یہاں سرکاری افسر بھی تھا۔ اس کی شریک حیات جس کو بہت چاہتا ہے اور امید رکھتا ہے کہ وہ ہمیشہ اس کا ساتھ دے گی۔وہ بھی اس مشکل گھڑی میں اس کا ساتھ چھوڑ جاتی ہے اور ولیم اکیلا ہندوستان میں رہ جاتا ہے، بالآخر زندگی کی جنگ ہار جاتا ہے اوراپنی پہچان نہیں بنا پاتا۔علی اکبرناطق نو لکھی کوٹھی میں یوں رقمطراز ہیں :

’’آج میں پھر ان ٹھنڈی ہواؤں کا لطف لیتے ہوئے غیر ارادی طور پر اس طرف بڑھ رہا تھا جیسے ہی اس کوٹھی پر پہنچا وہاں اور ہی رنگ تھے۔مغلیوں کے بچے صحن میں اچھل کود کر رہے تھے۔ذرا غور کیا تو پتا چلا کہ وہاں کوئی اور ہی خاندان آباد ہے۔میں نے جائزہ  لینے کے لیے بھر پور نظر ماری لیکن مجھے ولیم نظر...

IMPROVING THE QUALITY OF MEMORIZATION OF AL-QURAN THROUGH THE IMPLEMENTATION OF TAKRIR METHOD IN ISLAMIC BOARDING SCHOOL MATHOLIB AS-SULUK CIREBON

Many assume that people who have grown up do not have the opportunity to memorize the Qur'an because of the difficulties that will be faced in the process of memorizing it rather than in childhood. This research aims to find out (1) the application of the takrir method in Ponpes Matholib As-Suluk. (2) factors that affect students' ability to memorize by takrir method, (3) the quality of memorization of the holy verse of the Qur'an using the takrir method. This study uses descriptive qualitative methods. Through the technique of interviewing, observation and documentation studies, several findings were obtained: (1) the application of the takrir method in Ponpes Matholib As-Suluk was applied through the repetition of santri memorization in four ways: individual takrir, collective takrir with friends, takrir with teachers, and takrir at prayer time; (2) there are 2 factors that affect the application of takrir methods: internal (santri mood) and external factors (pesantren environmental support); and (3) the application of this method succeeded in improving the quality of santri memorization because the students were able to improve their memorization quite quickly and they were also able to reread verses and surahs that had been memorized quite smoothly.

A Framework for Network Security, Privacy and Adaptability Management Through Mobile Software Agents

This thesis targets network security – an essential area of computer science, which has gained progressively attention of researchers due to concerns and potential damages in various organizations. More specifically, it deals with insider threat that is less focused than the external threat. Software agents have been used as a technology in this research that autonomously roam around network. Software agents are diversified research area that covers artificial intelligence, programming abstraction and distributed computing. During literature surveys of various agent platforms it has been summed up that both agent standards, FIPA and MASIF, have their own advantages and disadvantages but still some missing features were pointed out such as security, distributed events and multicasting that are not well focused at all by any of the available standards. There are two possible ways to focus the problem, i.e. either these two standards may be combined or another standard may be proposed to include all features necessary for a true agent system. While working on the Agent based Security Framework, first a vulnerability assessment model has been developed that presents an agent based solution and demonstrates that both insiders and outsiders exploit the weaknesses of the system. The literature survey and the practical results of the model reveal that the insider threat is more critical than the outsider. During development of vulnerability assessment model many practical issues have been identified and appropriate solution has been proposed. For the assessment, both agent platform-dependent and platform- independent approaches were used to achieve the task. After comparing results of both approaches, it was proposed that a qualitative, standardized and comprehensive management of the agents is only possible with established and recognized agent platforms. Considering privacy as another component of dissertation, the Agent-based Profiling model has been developed. The model considers an individual’s personality profile to identify real personality in the cyberspace; Guard and guide to use internet resources, and analyzing social interactions to create social community. Major indicators involving profile generation and personality identification have been viiiargued and implemented. The framework helps to create virtual social community in the cyberspace where users are guarded and guided to use internet resources according to their actual profiles and the interests. The profiling model has been implemented in two different ways, i.e. JADE and .Net framework. Test results show that .Net framework supports many advanced tools and technologies therefore and agent platform on the top of the .Net framework is proposed to develop agent based models. Hence, the proposed solution to insider threat will be integrated on the top of agent technology to autonomously monitor and predict human behavior. As human behavior is difficult to predict, therefore autonomously monitoring user behavior is the key solution to avoid insider threat. The FIPA-compliant agent framework for profiling, ACENET (Agent Collaborative Environment based on .NET), has been developed to solve the problem. The proposed profiling framework allows identifying anomalies in user activities either online or offline. Online monitoring is carried out in real time that is used to catch the sensitive activity started by user against organization’s policy. Offline monitoring is carried out on daily, weekly and monthly basis and is based on the analysis of specified factors. Both online and offline monitoring use agent based approach to identify anomalies in user activities. Motivation behind the proposed model is that many procedural security measures are being taken by the organizations at lower level. This dissertation focuses on high level security measures through profiling based agent system to detect the activities user is performing in the organization. It is also checked out that if the user-activities are in accordance with organization’s policy or not? The research has been conducted about insider threat and several issues are addressed and solution has been provided. The major developments are: Monitoring behavior either suspicious or normal, Certifying user’s authenticity to use resources, Checking limitations of the users, Monitoring that user comes into view from the assigned location or not, Analyzing the level of the destruction caused by user, etc. The ACENET scores every user of the organization and maintains a detailed profile. It is really a cumbersome process to determine whether a legitimate user is doing any malicious activity. Expectantly such activity would stand out as strange when compared to the user''s routine behavior. ACENET is adaptable to deploy in any ixorganization. Agents have been designed as service on the top layers of the model. The developed agents create and maintain user-profiles and monitor activities autonomously. The threats have been categorized in various classes and for each category agents have been designed. Communication among agents takes place by message passing at upper level whereas internally socket based communication is underway. To resolve conflict between users and organizations, some professional ethical issues pertaining to privacy, have been addressed and appropriate solution has been proposed to implement the framework in accordance with the recognized standards. A matrix or grid of the trust levels ‘trust grid’ is designed similar to ACL where diverse access privileges are assigned to different level of the users. Currently grid has been divided in two categories: Binary [access given, not given] and Gradient [strong, moderate, weak, none]. The professional issues regarding activity monitoring were studied and it has been proposed that organization may announce in advance what can be monitored and what cannot be monitored, by providing a user monitoring policy. In the light of organization’s policy weight-age has been assigned to profile attribute to identify threat contribution of each suspicious activity and user. The Agent-based Security Framework, ACENET, was tested on real data, obtained from the organizations, and the performance has also been evaluated on the basis of specified parameters. Framework’s results were analyzed to match with the targeted objectives. Finally future directions for the extension of the framework have been presented.