Preferred Language
Articles
/
dRbkXIcBVTCNdQwC00d0
Classic vs. Novel Antibacterial Approaches for Eradicating Dental Biofilm as Adjunct to Periodontal Debridement: An Evidence-Based Overview
...Show More Authors

Periodontitis is a multifactorial chronic inflammatory disease that affects tooth-supporting soft/hard tissues of the dentition. The dental plaque biofilm is considered as a primary etiological factor in susceptible patients; however, other factors contribute to progression, such as diabetes and smoking. Current management utilizes mechanical biofilm removal as the gold standard of treatment. Antibacterial agents might be indicated in certain conditions as an adjunct to this mechanical approach. However, in view of the growing concern about bacterial resistance, alternative approaches have been investigated. Currently, a range of antimicrobial agents and protocols have been used in clinical management, but these remain largely non-validated. This review aimed to evaluate the efficacy of adjunctive antibiotic use in periodontal management and to compare them to recently suggested alternatives. Evidence from in vitro, observational and clinical trial studies suggests efficacy in the use of adjunctive antimicrobials in patients with grade C periodontitis of young age or where the associated risk factors are inconsistent with the amount of bone loss present. Meanwhile, alternative approaches such as photodynamic therapy, bacteriophage therapy and probiotics showed limited supportive evidence, and more studies are warranted to validate their efficiency.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Apr 24 2025
Journal Name
Al–bahith Al–a'alami
New Methods and Old Issues: Theoretical and Methodological Approaches to Social Network Sites in the Arab Region
...Show More Authors

This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Cogent Arts &humanities
An Ecostylistic Analysis of Selected Extracts from Michael Punke’s Novel The Revenant
...Show More Authors

.

View Publication
Scopus (1)
Scopus
Publication Date
Fri Sep 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Antibacterial, and Molecular Docking Study of Novel 2-Chloro-8-Methoxy-3-Aryl-[1,3] Benzoxazine Derivatives using Vilsmeier Reagent
...Show More Authors

Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl)amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones (5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones was secerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds (5a) showed mild antibacteri

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Jul 02 2020
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Antibacterial and Molecular Docking Study of Novel 2-Chloro-8-Methoxy-3-Aryl-[1,3] Benzoxazine Derivatives Using Vilsmeier Reagen
...Show More Authors

Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl) amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones(5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones wassecerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds(5a) showed mild antibacterial activit

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study for evidence of bacteria contamination in the southern part of the Diyala River / Iraq
...Show More Authors

Were studied some bacteria evidence of pollution as well as the total number of live bacteria in the waters of the Diyala river and selected five stations within the 17 km final Diyala River before its mouth in the Tigris River was the first before the new bridge of the Diyala River about 4 km and the second after the mouth of the water purification plant Rustumiya suit inverselywith temperatures

View Publication Preview PDF
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
The effectiveness of balance in building formal relationships for media evidence: ساهرة عبد الواحد حسن
...Show More Authors

The media guide is a small-sized printed medium, whose importance is highlighted through the specific information it carriesThe task of the guide lies in the clarity of these indications and making a positive impact on the recipient with understanding so it is a means for the purpose of reaching the effect and effectiveness of the message symbols from the movements of lines in which elements that are supposed to be equal in the performance of their functions and the purpose of their existence gather to achieve the mental response of perception, understanding and enjoyment. It must be in an objective unity based on the balance in this distribution. To form a formal organizational unit and an integrated system, the result of which is to gi

... Show More
View Publication Preview PDF