Preferred Language
Articles
/
gRdF35IBVTCNdQwCucL_
The Effect of Systemic Proteolytic Enzymes on Postoperative Inflammatory Response and Quality of Life after Surgical Extraction of Impacted Mandibular Third Molar
...Show More Authors

Background: The surgical extraction of impacted third molar usually results in postoperative inflammation manifested as pain, facial swelling and trismus which may cause deterioration in the patient’s quality of life. Methods: This randomized controlled study included 56 patients indicated for surgical extraction of IMTM under local anesthesia. These patients were randomly assigned into two groups: a study group that included patients who received Tibrolin® postoperatively and a control group that did not. The predictor variable was whether to use SET or not. Pain measured by the pain numerical rating scale (NRS), facial swelling, and the degree of trismus were the outcome variables. The Arabic version of the Oral Health Impact Profile 5 (OHIP5-Ar) questionnaire was used to measure quality of life (QoL) on the day of surgery (day 1) and on days 3, 7, and 13. Results: The study group demonstrated significantly lower pain scores postoperatively on day 1 and a lesser degree of facial swelling on day 3 compared to the control group, while no significant differences were observed regarding the other time intervals. There were no significant differences in the degree of trismus or QoL between the two groups. Conclusions: Tibrolin® administration following the surgical extraction of IMTM might reduce post-operative complaints in patients with surgical extraction of IMTM.

Scopus Crossref
View Publication
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Oct 06 2024
Journal Name
الذكوات البيض
Self-criticism in Quranic models and its impact on building them
...Show More Authors

Self-criticism is that a person confronts himself with his mistakes in order to reform and develop them for the better, motivate them and inspire hope in them to push them forward and continue to give in this life. The Holy Qur’an teaches us, through the models it cited in its verses, that this is through repentance, a feeling of remorse, and a determination to leave mistakes, and quit disobedience and sins, etc., and all this is done through constructive criticism, and at the same time, one must realize his strengths. , in order to succeed in preserving it and employing it in the right path that pleases God, His Messenger, himself and his society. This has been explained through an introduction, two topics and a conclusion, and God is t

... Show More
Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Russian Journal Of Bioorganic Chemistry
A Brief Review on Schiff Base, Synthesis, and Their Antimicrobial Activities
...Show More Authors

View Publication
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed May 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

In this study the activities of alanine transaminase (ALT) and aspartate transaminase (AST) were evaluated, in addition to total protein and albumins in sera of sixty one subjects whose ages were ranged between(4-16) years. These subjects were, twenty eight major thalassemic patient (12 with splenectomy and 16 non splenectomy ) and fifteen with minor thalassemia. eighteen healty subjecte as control. The result revealed a significant elevation in the activities of both aminotransferases enzymes (AST and ALT) in the sera of all the alassmic patient groups compared with control. Also a significant increase in the activity of ALT in sera of non-splenectomy compared to splenectomy major thalassemic patient , which could be an indicative of th

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Social responsibility for tourism companies and its reflection on strategic reputation
...Show More Authors

Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (43)
Crossref (43)
Scopus Clarivate Crossref