Preferred Language
Articles
/
8BcY_I4BVTCNdQwC4lo0
The in-vitro development of novel enzyme-based chemo-mechanical caries removal agents
...Show More Authors

Objectives Bromelain is a potent proteolytic enzyme that has a unique functionality makes it valuable for various therapeutic purposes. This study aimed to develop three novel formulations based on bromelain to be used as chemomechanical caries removal agents. Methods The novel agents were prepared using different concentrations of bromelain (10–40 wt. %), with and without 0.1–0.3 wt. % chloramine T or 0.5–1.5 wt. % chlorhexidine (CHX). Based on the enzymatic activity test, three formulations were selected; 30 % bromelain (F1), 30 % bromelain-0.1 % chloramine (F2) and 30 % bromelain-1.5 % CHX (F3). The assessments included molecular docking, Fourier-transform infrared spectroscopy (FTIR), viscosity and pH measurements. The efficiency of caries removal was assessed by DIAGNOdent pen, measuring the excavation time and number of applications, followed by a morphological evaluation of the remaining dentine using scanning electron microscopy (SEM). The results were compared to Brix 3000 as a control. Results The chloramine and chlorhexidine were chemically compatible with bromelain without compromising the enzyme activity. All experimental formulations showed higher viscosity and pH in comparison to Brix 3000. The DIAGNOdent readings were <20 in all groups, and the lowest readings were observed in F2. The excavation time and number of applications were lowest in F2 and F1. Both F2 and F3 produced smooth dentine surfaces with less tissue debris, but more patent dentine tubules were observed in F1 and F2. Conclusions The bromelain-contained formulations showed a potential to be used as chemomechanical caries removal agents in vitro. Further laboratory and clinical studies are needed to validate this claim.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
The impact of caries experience on quality of life among dental students in Iraq
...Show More Authors

Background: Dental caries is generally given the highest priority in national oral health services for adult populations. Yet, there is no study which has explored the impact on quality of life specifically related to dental caries in samples of dental students. The purpose of the current study was to assess the impact of caries experience on quality of life among dental students in three governorates in Iraq. Materials and Methods: This observational study included 1364 dental students aged 18–22 years old, from three governorates. Information on quality of life was obtained from a structured, self-administered questionnaire from the students who were willing to participate in the study. The data was collected, summarized and sta

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Semilogy of the Narrative Structure in "Nisa'a Al Altabat" Novel: The Semilogy of the Narrative Structure in "Nisa'a Al Altabat" Novel
...Show More Authors

Abstruct
This recearch is about studying the novel (doorstep’s women) by the Iraqi
narrator Hadia Hussian, and I choose Semiolog as a Curriculum for this
critical approach, because I think that this Semiotic curriculum has the ability
to read the Subjects and the narrative constructions. Which form the structure
of the novel starting from the little to the characters.
The focus is on many narrative constructions in the novel we have
studied the semiology of the tittle, the semiology of the cover, of the color, the
names of the characters and the semiology of the female characters.
First the focus of the novel is on the women’s characters because most
of it’s characters are women. Secondly because these

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2024
Journal Name
Current Medicinal Chemistry
Synthesis, In Silico Prediction, and In Vitro Evaluation of Anti-tumor Activities of Novel 4'-Hydroxybiphenyl-4-carboxylic Acid Derivatives as EGFR Allosteric Site Inhibitors
...Show More Authors
Introduction:

Allosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.

Methods:

A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Materials Science In Semiconductor Processing
Rational design of novel 0D/0D Bi2Sn2O7/CeO2 in the core-shell nanostructure for boosting the photocatalytic decomposition of antibiotics in wastewater: S-type-based mechanism
...Show More Authors

View Publication
Scopus (23)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
In silico analysis of quercetin as potential anti-cancer agents
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Sep 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of Dental Caries among Internally Displaced Children in Baghdad
...Show More Authors

Background: The internally displaced children are vulnerable groups have less access to dental services, worse oral health, and bear a disproportionate burden of oral diseases. Aim of the study: This study was conducted on group of internally displaced children living in Baghdad governorate camps to measure their dental caries prevalence and experience and find out the association between dental caries and the duration of displacement in camps. Subjects and methods: A sample of 1393 children were selected, 567 internally displaced children from camps in Baghdad governorate and 826 school children as control matching in age and gender. The age of children ranged from 5-12 years old. Oral examination was performed using WHO 2013 criteria, to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref