Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, flavonoids, and saponins. Notably, different components of the plant, comprising leaves and fruits, contribute to a spectrum of medicinal benefits. These encompass antimicrobial potency and potential anti-cancer properties. This study Investigates the phytochemical constituent and pharmacological activity of Guava by using previous studies and reports to collect more information about the guava plant. versatile properties extend to various therapeutic domains. The fruit has showcased its potential in domains like antidiabetic, antidiarrheal, hepatoprotective, anticancer, antioxidant, anti-inflammatory, antimicrobial, anti-allergy, and anti-plasmodial effects. Both guava leaves and fruits have been historically employed to address an array of conditions, including gastroenteritis, hypertension, diabetes, dental caries, and pain relief. While guava's pharmacological attributes are well-recognized, also all parts of guava have many phytochemical constituents. This review study shows the most important phytochemical constituents and pharmacological properties, it is vital to emphasize the need for further research. Enhanced understanding of the main mechanisms of action and the possible health advantages associated with guava necessitates continued investigation.
Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o
... Show MoreDuring the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe structure is considered in its scientific formula one of the concepts which complete the architectural image that seeks to take out an effective and attractive structure in contemporary architectural production, especially that the structure -in general- represents strength in addition to delight and functional benefits according to Vitruvius trinity. So, the role of structure depends on making its aesthetical properties able to give efficiency within architectural product. That has come through adoption of intellectual mechanism of structural means and details –as a whole or parts- and focused on structure with the recipient's needs, aesthetical, and sensory purposes in addition to its fundamental role of stabilit
... Show MoreThe aim of the present study was to characterize the Iraqi Tribulus terrestris for the presence of biologically active phyto-chemicals using methanolic extracts of the plant (aerial parts) by Gas Chromatography –Mass spectrometry (GC/MS), while the mass spectra of the compounds found in the extract was matched with the National Institute of Standards and Technology (NIST) library , in addition to study the antioxidant activity of plant extract , results confirmed the presence of therapeutically potent compounds in the Iraqi Tribulus terrestris extract predominantly alkaloids, flavonoids, saponins, tannins and terpenoids. Antioxidant potential of Iraqi Tribulus terrestris
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreClerodendrum plant is believed to be very useful in many countries for treating various health disorders .“in this study was undertaken to assess antimicrobial activity of ethanol and aqueous extracts of clerodendrum plant”. Display my alcoholic extract higher inhibition of the aqueous extract all of the bacteria (Esherichia Coli , Pseudomonas aeruginosa, Bacillus subtilis). While the inhibition of the aqueous extract bacteria (Streptococcus, Shigelladysenteria) in higher alcoholic extract. However, the bacteria (Klebseillapneumoniae) did not shown any inhibition zone for both aqueous and alcoholic extracts. From the above results,“ it is concluded the antibacterial properties of Clerodendrum against life threatening pathogens”. So,
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.