Periodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index, probing pocket depth and relative attachment level were recorded with the collection of subgingival plaque samples at different time intervals for bacterial analysis using real-time time-polymerase chain reaction. Results showed a significant reduction in the bacterial outcomes in the test group. There was a significant improvement in the Plaque index, probing pocket depth and relative attachment level in the test group compared to the control group. On intra-group comparison, both groups showed a significant reduction of Plaque index and probing pocket depth with a more significant reduction in the test group, and only the test group showed a significant reduction of relative attachment level. A strong positive correlation of P.gingivalis with probing pocket depth and relative attachment level in the test group was estimated. Curcumin gel has an antibacterial effect against Porphyromonas gingivalis and showed a potent improvement in the outcomes of the periodontal parameters. Keywords: Curcumin gel, periodontal pocket, Porphyromonas gingivalis
In this paper, membrane-based computing image segmentation, both region-based and edge-based, is proposed for medical images that involve two types of neighborhood relations between pixels. These neighborhood relations—namely, 4-adjacency and 8-adjacency of a membrane computing approach—construct a family of tissue-like P systems for segmenting actual 2D medical images in a constant number of steps; the two types of adjacency were compared using different hardware platforms. The process involves the generation of membrane-based segmentation rules for 2D medical images. The rules are written in the P-Lingua format and appended to the input image for visualization. The findings show that the neighborhood relations between pixels o
... Show MoreThis work deals with kinetics and chemical equilibrium studies of esterification reaction of ethanol with acetic acid. The esterification reaction was catalyzed by an acidic ion exchange resin (Amberlyst- 15) using a batch stirred tank reactor. The pseudo-homogenous and Eley-Rideal models were successfully fitted with experimental data. At first, Eley-Rideal model was examined for heterogeneous esterification of acetic acid and ethanol. The pseudo-homogenous model was investigated with a power-law model. The apparent reaction order was determined to be (0.88) for Ethanol and (0.92) for acetic acid with a correlation coefficient (R2) of 0.981 and 0.988, respectively. The reaction order was determined to be 4.1087x10-3 L0.8/(mol0.8.min) with
... Show MoreThe media plays an important role in a number of functions performed by them. Press is one of those media which had and still have a clear role in addressing the various issues, topics, and events. Journalism is no longer as expressed by owners of the liberal theory – it seeks to raise the instincts – but it began to excite the minds of readers to meet their needs. At the same time, it does not neglect the search for the truth and work to deliver it to readers. Some have identified a set of tasks carried out by the press including the interest in public affairs, the needs of the community, work to provide happiness, what is beneficial and useful and combat the negative phenomenon and to address the deviations facing society. The comi
... Show Moreكانت وسائل الاعلام- التقليدية والحديثة – وستبقى وسيلة مهمة لتدفق المعلومات والتعبير عن المشاعر ووصف الاحداث وتشكيل الرأي العام المحلي والدولي عن مختلف القضايا التي تهم الافراد والمجتمعات وفي مقدمتها قضايا العنف بمستوياته كافة ،والتطرف الديني والارهاب بكل مسمياته وستحاول هذه الدراسة ان تقدم اجابات عن اسئلة محددة تمثل الاطار النظري لدراسات مسحية ترصد النظريات التي ترسم الاطر النظرية الت
... Show MoreThis study includes the preparation of the ferrite nano ferrite CuxAl0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) M using the auto combustion method (sol-gel), and citric acid was used as fuel for auto combustion. The ferrite samples were checked by X-ray diffraction (XRD), Field Emission Scanning Electron Microscopes (FE-SEM), and energy dispersive X-ray analyzer (EDX). They showed that the prepared compound has a face-centered cubic structure (FCC). The lattice constant increases with an increase in the percentage of doping of the copper ions, and a decrease for the aluminum ion and that the compound is porous and its grains are spherical, and there are no other
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThe current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet
... Show More