Objectives Bromelain is a potent proteolytic enzyme that has a unique functionality makes it valuable for various therapeutic purposes. This study aimed to develop three novel formulations based on bromelain to be used as chemomechanical caries removal agents. Methods The novel agents were prepared using different concentrations of bromelain (10–40 wt. %), with and without 0.1–0.3 wt. % chloramine T or 0.5–1.5 wt. % chlorhexidine (CHX). Based on the enzymatic activity test, three formulations were selected; 30 % bromelain (F1), 30 % bromelain-0.1 % chloramine (F2) and 30 % bromelain-1.5 % CHX (F3). The assessments included molecular docking, Fourier-transform infrared spectroscopy (FTIR), viscosity and pH measurements. The efficiency of caries removal was assessed by DIAGNOdent pen, measuring the excavation time and number of applications, followed by a morphological evaluation of the remaining dentine using scanning electron microscopy (SEM). The results were compared to Brix 3000 as a control. Results The chloramine and chlorhexidine were chemically compatible with bromelain without compromising the enzyme activity. All experimental formulations showed higher viscosity and pH in comparison to Brix 3000. The DIAGNOdent readings were <20 in all groups, and the lowest readings were observed in F2. The excavation time and number of applications were lowest in F2 and F1. Both F2 and F3 produced smooth dentine surfaces with less tissue debris, but more patent dentine tubules were observed in F1 and F2. Conclusions The bromelain-contained formulations showed a potential to be used as chemomechanical caries removal agents in vitro. Further laboratory and clinical studies are needed to validate this claim.
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreBackground: Dental caries is generally given the highest priority in national oral health services for adult populations. Yet, there is no study which has explored the impact on quality of life specifically related to dental caries in samples of dental students. The purpose of the current study was to assess the impact of caries experience on quality of life among dental students in three governorates in Iraq. Materials and Methods: This observational study included 1364 dental students aged 18–22 years old, from three governorates. Information on quality of life was obtained from a structured, self-administered questionnaire from the students who were willing to participate in the study. The data was collected, summarized and sta
... Show MoreAbstruct
This recearch is about studying the novel (doorstep’s women) by the Iraqi
narrator Hadia Hussian, and I choose Semiolog as a Curriculum for this
critical approach, because I think that this Semiotic curriculum has the ability
to read the Subjects and the narrative constructions. Which form the structure
of the novel starting from the little to the characters.
The focus is on many narrative constructions in the novel we have
studied the semiology of the tittle, the semiology of the cover, of the color, the
names of the characters and the semiology of the female characters.
First the focus of the novel is on the women’s characters because most
of it’s characters are women. Secondly because these
Allosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.
A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR
Background: The internally displaced children are vulnerable groups have less access to dental services, worse oral health, and bear a disproportionate burden of oral diseases. Aim of the study: This study was conducted on group of internally displaced children living in Baghdad governorate camps to measure their dental caries prevalence and experience and find out the association between dental caries and the duration of displacement in camps. Subjects and methods: A sample of 1393 children were selected, 567 internally displaced children from camps in Baghdad governorate and 826 school children as control matching in age and gender. The age of children ranged from 5-12 years old. Oral examination was performed using WHO 2013 criteria, to
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More