Econazole nitrate (EN) is considered as the most effective agent for the treatment of all forms of dermatomycosis caused by dernatophytes. It was formulated as a topical solution in our laboratories. This study was designed to evaluate the effectiveness of Econazol Nitrate in the prepared formula and compared with that of commercial brand, Pevaryl®. A total of 104 patient suffering from dermatomycoses were involved in this investigation. Both formula were applied to the affected skin region in the morning and evening from week to 16 weeks with light massage until complete healing effect was achieved. The data revealed that the percentage of cured patient treated with the prepared formula and reference formula of Ecanozol Nitrate 1% solution were 90.3% and 88.4% respectively also chronic cases could be largely cured by treatment with the prepared formula Econazol Nitrate 1% solution. The results of this clinical investigation showed that the prepared formula of Ecanozol nitrate 1% was effective as compared to that of the commercial brand, Pevaryl®.
Background: Pulpotomy is an accepted treatment for the management of cariously exposed pulps in symptom free primary molars to achieve one of the most important goals for Pedodontists, which is the retention of the pulpally involved deciduous teeth healthy until the time of normal exfoliation. The purpose of this study was to evaluate the relative success of pulpotec, formocresol and Mineral Trioxide Aggregate (MTA) in cariously exposed primary molar teeth, using clinical and radiographical examinations. Materials and methods: Thirty nine children with 45 primary molars requiring pulpotomy were selected in this study, 15 teeth treated by each type of pulpotomy medicament. Clinical and radiographical follow up for the patients was performed
... Show MoreThe increasing use of antiseptic compounds creates selective pressure cause emergence of antiseptic resistance among Staphylococcus aureus .Resistance mechanism of antiseptic is driven mainly by multi drug resistant (MDR) efflux protein.Sixty five isolates of S.aureuswere collected from different clinical sources and subjected to 11 antibiotics most of them are recognized by efflux systems as extruded substrates. Range of efflux activity was estimated using cartwheel method. Simultaneous discrimination of antiseptic coding genes (qacA/B, smr and norA)as well as nuc and mecA genes among multidrug resistantS.aureus(MRSA) isolates was preformed using multiplex PCR assay
... Show MoreA novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreThe performa of evaluation process is a process that should be carried out by all industrial management in order to stand on aspects of development or underdevelopment of the various departments and activities in its industrial project for the purpose of identifying obstacles and find out the causes and then avoid them quickly. And intended to rectify the performance evaluation of the activities of industrial project or economic union by measuring the results achieved within a specific operational process and compare it to what is already targeted, and often the time for comparison of one year.
The process of performance evaluation depends upon several criteria and indicators within the
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More