Background: Pleomorphic adenoma of the minor salivary gland is a rare benign tumor. It commonly occurs in the hard and soft palates. Treatment by surgical excision achieved success in improving the patient’s health. Objective: To evaluate the recurrence rate after surgical treatment of pleomorphic adenoma in minor salivary glands. Methods: This retrospective study included patients who attended the Maxillofacial Surgery Unit in Ghazi Al-Hariri Hospital, Baghdad, from 2019 to 2021, complaining of soft tissue lumps involving the soft and hard palate, buccal mucosa, and upper lip. After the provisional diagnosis of these lesions, a total surgical excision of the tumor with a safe margin of 1 mm was performed, and the biopsy was sent for histopathological examination. A follow-up evaluation was performed for all patients two years after surgery. Results: Twenty-three patient data sheets with minor salivary gland pleomorphic adenoma were screened and initially included in this study. Only 12 patients (8 males and 4 females) were eligible, and 11 were excluded. Out of the patients who had total surgical excision, two women experienced tumor recurrence during the follow-up period. One had an ulcerated pleomorphic adenoma in the hard palate, and the other had a pleomorphic adenoma in the soft palate with mucosal tethering. Conclusions: Wide surgical excision is a successful treatment to decrease the recurrence rate, especially in cases of ulceration and tethering.
A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreThe study area is encompassed by the 33.59-34.93°N latitudes and 45.44-46.39°E longitudes and divided into four groups with respect to earthquake event locations. We determined fault plane solutions, moment magnitudes, focal depths, and trend of slip with the direction of the moment stress axes (P, N, and T) for 102 earthquakes. These earthquakes had a local magnitude in the range between 4.0 and 6.4 for the time period from January 2018 to the end of August 2019, with focal depths ranged between 6 and 17 km. Waveform moment tensor inversion technique was used to analyze the database constructed from seismic stations on local and neighboring country networks (Iraq, Iran, and Turkey). We separated the studie
... Show MoreBacterial strains were isolated from oil-contaminated soil, in 2018, these isolates were identified, and with the aim of finding out the ability of these isolates to degrede the oil compounds, the color change of medium which added to it isolates was read by the method of Pacto Bushnell Hans. Then the change in the petroleum compounds was read by gas chromatography, for the most effective isolates.
The nine isolated bacterial showed different degrees of color change, and the isolates (Pseudomonas, Bacillus, Micrococcus) outperformed the color change amount (78, 78, 77) %, respectively, compared to the control, and the three isolates together showed the best color change of 90.7. % Compared to the control, and the
... Show MoreIn the present article, mixed ligand metal (II) complexes have been synthesized with Schiff base (1E, 5Z, 6E)-1,7 bis (4-hydroxy-3- methoxyphenyl)-5-(3-hydroxyphenyl) imino) hepta-1,6-dien-3-one derived from Curcumin and 3-aminophenol as primary ligand and L-dopa as a secondary ligand. The Schiff base act as bidentate and arrange to the metals through the azomethine (C=N) nitrogen and (C=O) oxygen atom. The mode of bonding of the Schiff base has been affirmed on the infrared by the UV-Visible, 1H, and 13C NMR spectroscopic techniques. The magnetic susceptibility and the UV-Vis data of the complexes propose octahedral geometry around the central metal ion. The information appears that the complexes have the structure of [L-M-(L-dopa)] system
... Show MoreThis research presents a response surface methodology (RSM) with I‐optimal method of DESIGN EXPERT (version 13 Stat‐Ease) for optimization and analysis of the adsorption process of the cyanide from aqueous solution by activated carbon (AC) and composite activated carbon (CuO/AC) produced by pyro carbonic acid microwave using potato peel waste as raw material. Pyrophosphate 60% (wt) was used for impregnation with an impregnation ratio 3:1, impregnation time of 4 h at 25°C, radiant power of 700 W, and activation time of 20 min. Batch experiments were conducted to determine the removal efficiency of cyanide from aqueous solution to evaluate the influences of various experimental parameters su
In the present study, silver nanoparticles (AgNPs) were prepared using an eco-friendly method synthesized in a single step biosynthetic using leaves aqueous extract of Piper nigrum, Ziziphus spina-christi, and Eucalyptus globulus act as a reducing and capping agents, as a function of volume ratio of aqueous extract(100ppm) to AgNO3 (0.001M), (1: 10, 2: 10, 3: 10). The nanoparticles were characterized using UV-Visible spectra, X-ray diffraction (XRD). The prepared AgNPs showed surface Plasmon resonance centered at 443, 440, and 441 nm for sample prepared using extract Piper nigrum, Ziziphus spina-christi, and Eucalyptus respectively. The XRD pattern showed that the strong intense peaks
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MorePhosphorus‐based Schiff base were synthesized by treating bis{3‐[2‐(4‐amino‐1.5‐dimethyl‐2‐phenyl‐pyrazol‐3‐ylideneamino)ethyl]‐indol‐1‐ylmethyl}‐phosphinic acid with paraformaldehyde and characterized as a novel antioxidant. Its corresponding complexes [(VO)2L(SO4)2], [Ni2LCl4], [Co2LCl4], [Cu2LCl4], [Zn2LCl4], [Cd2LCl4], [Hg2LCl4], [Pd2LCl4], and [PtL
... Show More