A single-blind randomized controlled clinical trial in patients with deep caries and symptoms of reversible pulpitis compared outcomes from a self-limiting excavation protocol using chemomechanical Carisolv gel/operating microscope (self-limiting) versus selective removal to leathery dentin using rotary burs (control). This was followed by pulp protection with mineral trioxide aggregate (MTA) and restoration with glass ionomer cement and resin composite, all in a single visit. The pulp sensibility and periapical health of teeth were assessed after 12 mo, in addition to the differences in bacterial tissue concentration postexcavation. Apical radiolucencies were assessed using cone beam computed tomography/periapical radiographs (CBCT/PAs) taken at baseline 0 mo (M0) and 12 mo (M12). In total, 101 restorations in 86 patients were placed and paired subsurface, and deep (postexcavation) dentin samples were obtained. DNA was extracted and bacteria-specific 16S ribosomal RNA gene quantitative polymerase chain reaction was performed. No significant difference was found in bacterial copy numbers normalized to mass of dentin (“bacterial tissue concentration”) between the self-limiting (96.3% reduction) and control protocols (97.1%, P = 0.33). The probability of 12-mo success was 4 times (odds ratio [OR] = 4.33; confidence interval [CI], 1.2–15.6; P = 0.025) higher in the self-limiting protocol compared to the control (conventional excavation technique), with pulp survival rates of 73.3% and 90%, respectively ( P = 0.049). Molars had a 4 times higher probability of success compared to premolars (OR, 4.17; CI, 1.17–14.9; P = 0.028), and symptom severity did not statistically predict outcome (OR, 0.41; CI, 0.12–13.9, P = 0.153). CBCT detected significantly more periapical (PA) lesions than PA radiographs at the baseline visit ( P < 0.001). In conclusion, the self-limiting caries excavation protocol under magnification increased pulp survival rate compared to rotary bur excavation ( ClinicalTrials.gov NCT03071588).
Background: Liver metastasis significantly complicates cancer prognosis, yet easily accessible markers for its early detection and monitoring remain crucial. This study aimed to comprehensively evaluate key hematological parameters as potential indicators for liver metastasis in Iraqi patients. Methods: We conducted a cross-sectional study comparing hematological profiles between 90 patients (presumably with liver metastasis) and 30 healthy controls. White Blood Cell (WBC) count, Lymphocyte percentage, Neutrophil percentage, and Neutrophil-to-Lymphocyte Ratio (NLR) were analyzed. Given non-normal data distributions (confirmed by the Shapiro-Wilk test), group comparisons were performed using the non-parametric Mann-Whitney U test.
... Show MoreThe effect of electrolysis operating parameters on the removal efficiency of cadmium from a simulated wastewater was studied by adopting response surface methodology combined with Box–Behnken Design. As a new electrode design, spiral-wound woven wire mesh rotating cylinder electrode was used for cadmium removal. Current (240–400 mA), rotation speed (200–1000 rpm), initial cadmium concentration (200–600ppm), and cathode mesh number (30–60) were chosen as independent variables while the removal efficiency of cadmium was considered as a response function. The results revealed that the rotation speed has the major effect on the removal efficiency of cadmium. Regression analysis showed good fit of the experimental data to the second-or
... Show MoreThe aim of this study was to evaluate the effects of local application of bisphosphonate gel and recombinant human bone morphogenic protein 2 gel, on titanium dental implant stability and marginal bone level. Twenty-seven patients with upper and lower missing posterior tooth/teeth were included in the study with a total of 71 implants that were used for rehabilitation. The implants were randomly divided into 4 groups: 3 study groups and 1 control. Group1; local application of bisphosphonate gel, group 2; local application of recombinant human bone morphogenic protein 2 gel, group 3; local application of a mixed formula of both gels. The gel application was immediately preimplant insertion, group 4; implant insertion without application of a
... Show MoreMenorrhagia is common in patients with uterine fibroids, if operation needs to be delayed for a particular reason, goserelin can be used safely to reduce bleeding and the size of the tumor.The objective is to compare between goserelin acetate and norethisterone on patients with menorrhagia and uterine fibroid. A randomized controlled study conducted in Elwiya maternity teaching hospital, Baghdad from the first of November 2007 to the end of April 2009. 90 patients from the consultant outpatient clinic with menorrhagia and fibroid, and their operations were delayed for medical reason were allocated in two groups, the first group, was given 3.2 mg goserelin acetate subcutaneously monthly for 3 months and the second group was given 5 mg nor
... Show MoreAbstract ABSTRACT:BACKGROUND: Anterior cruciate ligament reconstruction (ACLR) is one of the most commonly performed orthopedic procedures. Technical factors especially correct tunnel placement play major role in its success. However its failure rate is still high (10%), and impingement of the graft on the posterior cruciate ligament (PCL) and the medial wall of the lateral femoral condyle is an important cause of failure. Wallplasty is a technique used to prevent graft impingement, but there is no consensus on its routine use.OBJECTIVE:Is to compare between the postoperative knee functional outcome and stability of arthroscopic ACLR performed with wallplasty versus those performed without wallplasty.PATIENTS AND METHODS: A prospective exp
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More