Piperine, a crystalline alkaloid compound isolated from Piper nigrum, piper longum, and other types of piper, has had many fabulous pharmacological advantages for preventing and treating some specific diseases, such as analgesic, anti-inflammatory, hepatoprotective, antimetastatic, antithyroid, immunomodulatory, antitumor, rheumatoid arthritis, osteoarthritis, Alzheimer's, and improving the bioavailability of other drugs. However, its potential for clinical use through oral usage is hindered by water solubility and poor bioavailability. The low level of oral bioavailability is caused by low solubility in water and is photosensitive, susceptible to isomerization by UV light, which causes piperine concentration to decrease. Many different formulation approaches have been applied to improve the poor oral bioavailability of piperine. There have been oral formulation strategies that have been successfully implemented in increasing the solubility and bioavailability of piperine within the body, such as the formulation of nanoparticles, nanosuspensions, salt formation, liposomes, complexation using polymers, micro/nano-emulsions, and solid dispersions. This review presents a summary of piperine biopharmaceuticals, new formulation design approaches to improve oral bioavailability of piperine, and several techniques and methods for conducting selective and sensitive analysis of piperine in biological fluids.
Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreBackground: Oral health represents an important base for human well-being; the heath of the body begins from oral cavity. Great deal has been applied to increase knowledge in the field of oral health in order to develop appropriate preventive program. This study was conducted in order to estimate the percentage and severity of dental caries and gingivitis among children attending Preventive Department in Collage of Dentistry, University of Baghdad and to determine dental treatment need for those patients, further more to study the relation of these variables with dental knowledge. Materials and Methods: The study group consists of 163 children with an age ranged from 6 to 14 years, who attended the preventive clinic for the first time to be
... Show MoreDeveloping a solid e-voting system that offers fairness and privacy for users is a challenging objective. This paper is trying to address whether blockchain can be used to build an efficient e-voting system, also, this research has specified four blockchain technologies with their features and limitations. Many papers have been reviewed in a study covered ten years from 2011 to 2020. As a result of the study, the blockchain platform can be a successful public ledger to implement an e-voting system. Four blockchain technologies have been noticed from this study. These are blockchain using smart contracts, blockchain relying on Zcash platform, blockchain programmed from scratch, and blockchain depending on digital signature. Each bl
... Show MoreThe search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.
The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.