Background: The surgical extraction of impacted third molar usually results in postoperative inflammation manifested as pain, facial swelling and trismus which may cause deterioration in the patient’s quality of life. Methods: This randomized controlled study included 56 patients indicated for surgical extraction of IMTM under local anesthesia. These patients were randomly assigned into two groups: a study group that included patients who received Tibrolin® postoperatively and a control group that did not. The predictor variable was whether to use SET or not. Pain measured by the pain numerical rating scale (NRS), facial swelling, and the degree of trismus were the outcome variables. The Arabic version of the Oral Health Impact Profile 5 (OHIP5-Ar) questionnaire was used to measure quality of life (QoL) on the day of surgery (day 1) and on days 3, 7, and 13. Results: The study group demonstrated significantly lower pain scores postoperatively on day 1 and a lesser degree of facial swelling on day 3 compared to the control group, while no significant differences were observed regarding the other time intervals. There were no significant differences in the degree of trismus or QoL between the two groups. Conclusions: Tibrolin® administration following the surgical extraction of IMTM might reduce post-operative complaints in patients with surgical extraction of IMTM.
Ecosystems provide humans with services that include benefits from food, fresh water, climate regulation, and socio-economic assets. The Mesopotamian marshlands are among the largest wetlands in the Middle East and they provide various benefits. However, ecosystem services of the Marshlands are consistently undervalued in national economic analysis and decision making. This study focusses on the Central Marshes, the first National Park in Iraq, and is the first attempt at valuing a series of ecosystem services from a valuable natural ecosystem in Iraq. We adopted the Toolkit for Ecosystem Services Site-Based Assessment (TESSA) for the determination of biophysical and economic values of services at the site level. Data on key ecosystem se
... Show MoreNowadays, most of the on-chip plasmonic single-photon sources emit an unpolarized stream of single photons that demand a subsequent polarizer stage in a practical quantum cryptography system. In this paper, we numerically demonstrated the coupling of the light emitted from a quantum emitter (QE) at 700 nm wavelength to the propagation mode supported by an on-chip hybrid plasmonic waveguide (HPW) polarization rotator. Our results proved that the light emitted is linearly polarized at 0º, 45º/−45º, and 90º with propagation lengths of 5 μm, 3.3 μm, and 3.9 μm, respectively. Moreover, high power-conversion efficiency was obtained from an applied transverse magnetic (TM) mode (0º-polarization) to a transverse electric (TE) (90º-polari
... Show MoreIn the current study, wild land plant specimens were collected during the flowering and fruiting period of these plants in February, April, June, August, and October 2023 from the riparian area of the Dujail River, Salahaldin Province, north of Baghdad, Iraq. Identified and the results showed that the number of these species were: 104 species, belong to 29 plant families, Included 26 dicotyledon families with 76 genera and 96 species. The asteraceae family was the most diverse, with 30 species, followed by Brassicaceae with (12) species. Additionally, there were 13 families represented by only one species in Dujail River which included: Apocynaceae, Berberidaceae, Capparaceae, Caryophyllaceae, Convolvulaceae, Geraniaceae, Lythraceae
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreGlobalization as phenomena has affected all aspects of life and reflected its impacts to the Arab world politically, economically, and culturally and became a vital field that related directly to our life. This field of searching needs as many studies and Academics as for employing the means that needed to face a national challenge which targeting the Arabic man Character in its ethics and values. This very important thing needs a very important reaction to face that challenge to protect the cultural ARABIC & ISLAMIC characteristics and to take care of education in all its levels and forms as it is an invincible fort. For that, this field has become as the priority of the studying and researches if the
... Show MoreThe present study was carried out on forty eight epididymis of sexually mature dogs to elucidate light microscope features and the presence of testosterone receptors inside epididymis in different seasons. Twenty four dogs aged 3 years were used during the periods from 1/2/2015-1/2/2016. The epididymis were carefully dissected from the testis after orchidectomy operations and fixed, dehydrated, clarified and embedded in paraffin. Sections were stained with hematoxylin and eosin and periodic acid schiff. As well as, paraffin embedded cytoimmunochemistry technique was used for detection of testosterone receptors. Muscular coats showed no significant differences during different seasons or among segments. Epithelial heigh
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More