Periodontal diseases are inflammatory diseases, for which, scaling and root planning is the main approach. Diode laser therapy as an adjunct to non-surgical periodontal treatment has shown some beneficial effects.
Aim: The objective of this single randomized controlled clinical study was to assess the effect of a 940 nm diode laser as an adjunct to SRP therapy in the treatment of periodontal pockets.
Methods: In this study, twenty patients in need of periodontal treatment with periodontal pocket ≥ 4 mm were selected for this split-mouth clinical study. Test group treated by diode laser 940 nm as an adjunct with SRP, control group treated by SRP in contralateral quadrants. Clinical
... Show MoreDesign and build a center basins new p-type four mirrors were studied its effect on all parameters evaluating the performance of the solar cell silicon in the absence of a cooling system is switched on and noted that the efficiency of the performance Hzzh cell increased from 11.94 to 21 without cooling either with cooling has increased the efficiency of the
In this study, a platinum(II) complex ([Pt(H2L)(PPh3)] complex) containing a thiocarbohydrazone as the ligand was tested as an anti-proliferative agent against ovarian adenocarcinoma (Caov-3) and human colorectal adenocarcinoma (HT-29) through MTT assays. Apoptotic markers were tested by the AO/PI double staining assay and DNA fragmentation test. Flow cytometry was conducted to measure cell cycle distribution, while the p53 and caspase-8 pathways were tested via immunofluorescence assay. Results demonstrated that the cytotoxic effect of the Pt(II)- thiocarbohydrazone complexes against Caov-3 and HT-29 cells was highly significant, and this effect triggered the activation of the p53 and caspase-8 pathways. Besides, apoptosis stimulated by th
... Show MoreCommunication has seen a big advancement through ages; concepts, procedures and technologies, it has also seen a similar advancement of language. What unites language and media is the fact that each one of them guides and contributes to the other; media exists and results from language and from the other sign systems, and what strengthens this connection is the symbolic language system, as media helps it by providing knowledge and information. The change that occurred through time must leave a significant trace in the media, for example Diction, which has changed concerning development and growth, also the ways and mediums of media have become manifold and widespread. This change affected the recipient whether it was a reader, listener o
... Show MoreAbstract
The article is devoted to the study of modal framework of the utterance with the semantics of “disappearance” in modern Russian language. The empirical basis of the study was the works of Russian writers, such as M.A. Bulgakov, F.M. Dostoevsky, A.I. Kuprin., L.M. Leonov, B.L. Pasternak, K.G. Paustovsky, L.N. Tolstoy, I.S. Turgenev and others. The author focuses special attention on the role of the modal component in the formation of the sentences and its modal semantics. A lot attention is paid to the analysis of the reasons of productivity / low productivity in the functioning of the temporal forms of the verbs that form these utterances. The nature of the material of study determined the choice of
... Show MoreThree hundred and fifty five patients with hepatitis were investigated in this study all cases gave negative result with HBs Ag , IgM-anti HCV , IgM-anti HEV, IgM-anti HDV and anti-HIV tests . The frequency of IgM-anti HAV was 113 and the percentage was 32 % in all ages but when these patients divided into five groups dependent on ages. The highest percentage of IgM-anti HAV was (45%) in age <10 and the percentage declined with age increase till to 9% in age >41 year.
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More