Preferred Language
Articles
/
ehfAjJIBVTCNdQwCO7Yc
Antimicrobial Efficacy of a Novel Herbal Endodontic Irrigant Against Enterococcus Faecalis in Root Canals of Permanent Teeth: An in Vitro Study
...Show More Authors

Background: A successful endodontic treatment is aimed at the sterilization of the entire pulp space. The use of extracts from Rhamnus prinoides as a novel irrigating material for root canal has not been studied . Hence, the antimicrobial efficacy of the alcoholic extract of Rhamnus prinoides as an irrigation material against E. faecalis was evaluated in comparison with the 2.5% sodium hypochlorite (NaOCL) solution used for root canals of permanent teeth. Methods: A total of 30 single-rooted human permanent teeth were thoroughly cleaned, shaped, and disinfected. Then, each tooth was subjected to a two-week infection with Enterococcus faecalis at 37 °C . Afterward, the samples were divided into three groups (10 teeth per group): 0.9% normal saline, 2.5% sodium hypochlorite, and 250 µg/ml Rhamnus prinoides. Paper points were used before and after irrigation to collect samples. Bacterial growth was evaluated after 24 h. Bacterial colonies were counted. The data were examined statistically via one-way analysis of variance, Dunnett’s T3 post hoc test, and Shapiro–Wilk test. The level of significance was set at p<0.05.  Results: The 2.5% sodium hypochlorite and 250 µg/ml Rhamnus prinoides demonstrated higher effectiveness against biofilm of Enterococcus faecalis than normal saline (p<0.05). The percentage of antibacterial effectiveness were 94.094 ±3.342, 93.685 ±5.280, and 25.603 ±3.912. Conclusions: Rhamnus prinoides, when used as root canal irrigant solution, was effective the sodium hypochlorite against the E. faecalis biofilm.

Crossref
View Publication
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Controlled Release
The efficacy of aerosol treatment with non-ionic surfactant vesicles containing amphotericin B in rodent models of leishmaniasis and pulmonary aspergillosis infection
...Show More Authors

View Publication
Scopus (49)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Thu Dec 19 2019
Journal Name
НАУЧНЫЙ ФОРУМ
EMOTIONALLY PAINTED VOCABULARY ON THE FIGHT AGAINST INTERNATIONAL TERRORISM IN MEDIA MATERIALS
...Show More Authors

The article considers the language of the mass media as a synthesis of the language means of all other styles of language. It is alleged that the newspaper and journalistic language actively uses foreign words and elements of words, replenishing the vocabulary of the language. It is noted that the lexical-semantic system of language is sensitive to socio-economic, political, cultural and scientific-technical changes. Attention is focused on the fact that one of the reasons that affect the change in the lexical composition of the language are the mass media. Thus, the language of the media is characterized by the use of a variety of neutral vocabulary, which, in conjunction with other words in atypical combinations for it, can acquire additi

... Show More
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Complete Blood Count and Cinnamic acid activity against Cytoxan in albino mice.
...Show More Authors

The aim of study to evaluated cinnamic acid and its activity on complete blood count(RBC,WBC,HG,HCV,MCH,MCHC and Plat.)and removed the cytoxan damage which caused bone marrow failure and leukemia and other that due to linked the cytoxan in 7- nitrogen of guanine based of DNA that lead to dead cells. Two concentration from pure cinnamic acid (5.6, 2.8 mg ? mice weight) in first step to choice the perfect concentration in comparison with each negative control ,positive control of cytoxan and the comparison group represent vitamin C. The second step to understand cinnamic acid mechanism activity towards cytoxan by used pre- cytoxan and post – cytoxan in interaction with perfect concentration of cinnamic acid dose (2.8 mg ? mice we

... Show More
View Publication Preview PDF
Crossref (2)
Crossref