It is clear that correct application of antibiotic prophylaxis can reduce the incidence of infection resulting from the bacterial inoculation in a variety of clinical situations; it cannot prevent all infections any more than it can eliminate all established infections. Optimum antibiotic prophylaxis depends on: rational selection of the drug(s), adequate concentrations of the drug in the tissues that are at risk, and attention to timing of administration. Moreover, the risk of infection in some situations does not outweigh the risks which attend the administration of even the safest antibiotic drug. The aim of this study was to compare between 2 prophylactic protocols in out patients undergoing oral surgical procedures. Thirty patients, selected from the attendants of oral surgery clinic in Al-Karamah Dental Center, were subjected to different oral surgical procedures under local anesthesia. These patients were given single dose antibiotic prophylaxis in 2 groups; 1st group were 15 patients given 1 million i.u. of procaine penicillin I.M. 30 minutes before oral surgery, 2nd group were 15 patients given 600mg clindamycin orally 1 hours before oral surgery. The maximum time for all procedures was 2 hours. There was no difference between procaine penicillin (1 million i.u.), and clindamycin (600mg), regimens concerning post operative infection in out patient’s oral surgical procedures. Key words: Antibiotic prophylaxis, outpatient oral surgery
Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa
... Show MoreAn experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a
The plant Dianthus Orientalis that belongs to the Caryphyllaceae family is one of the useful plants in Iraq. Its seeds are commonly used for toothache. This project provides the first comprehensive research done in Iraq and the world to study the phytochemicals and the methods of extraction and isolation of active constituents from Dianthus orientalis wildly grown in Iraq. The plant was harvested from Penjwin in AL-Sulaymaniyah city, Iraq in September 2019.The whole plant were washed carefully, dried in shade area for two weeks, and milled in a mechanical grinder to a coarse powder. The plant was defatted by maceration with hexane for 7days and dried after that extracted by cold extraction methods using
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreThe CenomanianÐEarly Turonian reservoirs of the Mishrif Formation of the Mesopotamian Basin hold more than one-third of the proven Iraqi oil reserves. Difficulty in predicting the presence of these mostly rudistic reservoir units is mainly due to the complex paleogeography of the Mishrif depositional basin, which has not been helped by numerous previous studies using differing facies schemes over local areas. Here we present a regional microfacies-based study that incorporates earlier data into a comprehensive facies model. This shows that extensive accumulation of rudist banks usually occurred along an exterior shelf margin of the basin along an axis that runs from Hamrin to Badra a
Objective(s): To evaluate students’ communication skills and their academic performance; to compare between the students relative to communication skills and their academic performance in the University of Baghdad and to identify the relationship between students’ communication skills, academic performance and their socio-demographic characteristics of age, gender, grade and socioeconomic status. Methodology: A descriptive design, using the evaluation approach, is carried through the present study to evaluate colleges’ students’ communication skills and their academic performance in the University of Baghdad for the period of January 7th 2019 to August 28th 2019. A non-probability, purposive sample, of (80) university students, i
... Show More