25 research outputs found

    Niosomes: A prominent tool for transdermal drug delivery

    No full text
    ABSTRACT Now-a-days a tremendous research work is going on to overcome the barrier properties of the skin. Recently niosomes have been reported for enhanced delivery of drugs. Niosomes are globular submicroscopic vesicles composed of nonionic surfactants. Meloxicam is used as model drug in the present study. Meloxicam entrapped niosomes were prepared by Thin film hydration technique using Nonionic surfactants (Span-80, Span-60, Tween-80 and Tween-60), Cholesterol and drug in different ratios. The prepared niosomes were characterized for size, shape, entrapment efficiency, In-Vitro drug release and In-Vivo performance. The niosomes appeared as round in shape and size range was found to be 1.54 -2.64µm. Among all formulations FS80 4 shows high entrapment efficiency and consistent drug release pattern. In-Vivo anti inflammatory activity of niosomal gel prepared with FS80 4 was studied and compared with anti inflammatory activity of conventional meloxicam gel adopting Carrageenan induced rat paw edema method. The studies were demonstrated that niosomal gel was shown better pharmacological activity than the conventional meloxicam gel. Based on the results it was concluded that niosomal preparation offers more advantages than the conventional preparation

    A facile Ph<sub>3</sub>P/CO<sub>2</sub> mediated, one-pot synthesis of 2-oxazolidinones from 1,2-azido alcohols <i style="">via</i> phosphazene and isocyanate intermediates

    No full text
    978-984A facile, efficient and convenient method has been developed for the one-pot synthesis of 2-oxazolidinones from the corresponding 1,2-azido alcohols via phosphazene and isocyanate intermediates in presence of Ph3P/CO2 in toluene

    FOP: FIREWALL OPTIMIZATION PROTOCOL FOR CROSS-DOMAIN PRIVACY PRESERVING

    No full text
    In this paper we identified an important problem, cross-domain privacy preserving inter firewall redundancy detection we propose a novel privacy-preserving protocol for detecting such redundancy. Our protocol is most beneficial if both parties are willing to benefit from it can collaborate in a mutual manner. There are many special cases that could be explored based on our current protocol. For example, there may be hosts or network address translation (NAT) devices between two adjacent firewalls. Our protocol incurs no extra online packet processing overhead and the offline processing time is less than a few hundred seconds
    corecore