In recent decades, drug modification is no longer unusual in the pharmaceutical world as living things are evolving in response to environmental changes. A non-steroidal anti-inflammatory drug (NSAID) such as aspirin is a common over-the-counter drug that can be purchased without medical prescription. Aspirin can inhibit the synthesis of prostaglandin by blocking the cyclooxygenase (COX) which contributes to its properties such as anti-inflammatory, antipyretic, antiplatelet and etc. It is also being considered as a chemopreventive agent due to its antithrombotic actions through the COX’s inhibition. However, the prolonged use of aspirin can cause heartburn, ulceration, and gastro-toxicity in children and adults. This review article highlights the recent derivatives of aspirin, either to reduce the risk of side effects or to obtain better physicochemical properties. Aspirin derivatives can be synthesized in various pathways and have been reported to give better biological activities such as anticancer, anti-inflammatory, antibacterial, antioxidant, etc., compared to the parent drug. The presence of significant moieties such as nitric oxide (NO), NOSH, thiourea, azo, amide, and chalcone on the modified aspirin play important roles in achieving desired biological activities. The addition of the halogen in the modification has also become a preference among researchers as it also affects the actions due to its ability to hinder bacterial activity. This review is also sharing about the bulkiness effect of certain aspirin modifications that may cause steric hindrance of the compounds and influence their penetration into the enzyme’s active site. Overall, these aspirin modifications are safe to be considered as potential pharmaceutical agents.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreSince its discovery in December 2019, corona virus was outbreak worldwide with very rapid rate, so it described by WHO as pandemic. It associated with severe acute respiratory distress syndrome, and can enter to cells through Angiotensin Converting Enzyme 2 (ACE 2) receptor which play an important role as regulator for blood pressure. Hypertension is a potential risk factor for sever acute respiratory syndrome COVID-19, and associated with high mortality rate as shown in many epidemiological studies. Moreover, specific antihypertensive medications that infected patients were receiving are not known; only data about renin-angiotensin-aldosterone system (RAAS) are available.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreBackground: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. T
... Show MoreBackground: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. The fo
... Show MoreAbstract:
Borago officinalis is highly interesting amongst nutritional and medical source relate to its high composition of some useful phytochemical compound. It is great plants with bright blue star-shaped flowers present in most world regions and usually known as borage. The Borago phytochemical analysis showed the presence of alkaloids, tannins, flavonoids, phenolic acids, essential oil, vitamins and others. Borage is cultivated all over the world and used in traditional medicine as a demulcent, diuretic, emollient, tonic, expectorant, for the treatment of coughs, inflammation and swelling, and other diseases. In herbal medicine, Borage seed oil (BSO) has been utilized for many progressive illnesse
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.