Background: The surgical extraction of impacted third molar usually results in postoperative inflammation manifested as pain, facial swelling and trismus which may cause deterioration in the patient’s quality of life. Methods: This randomized controlled study included 56 patients indicated for surgical extraction of IMTM under local anesthesia. These patients were randomly assigned into two groups: a study group that included patients who received Tibrolin® postoperatively and a control group that did not. The predictor variable was whether to use SET or not. Pain measured by the pain numerical rating scale (NRS), facial swelling, and the degree of trismus were the outcome variables. The Arabic version of the Oral Health Impact Profile 5 (OHIP5-Ar) questionnaire was used to measure quality of life (QoL) on the day of surgery (day 1) and on days 3, 7, and 13. Results: The study group demonstrated significantly lower pain scores postoperatively on day 1 and a lesser degree of facial swelling on day 3 compared to the control group, while no significant differences were observed regarding the other time intervals. There were no significant differences in the degree of trismus or QoL between the two groups. Conclusions: Tibrolin® administration following the surgical extraction of IMTM might reduce post-operative complaints in patients with surgical extraction of IMTM.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MorePraise be to God, and may blessings and peace be upon our master and Prophet Muhammad and those who follow him, and may God be pleased with him
Taha is my guardian and whoever follows their path until the Day of Judgment. And after... The book (The Treasure in the Ten Recitations), written by Abu Muhammad Abdullah bin Abd al-Wasiti, who died in the year 710 AH, is considered one of the important books in recitations: because it included the universal custom that it contained in the books Al-Taysir by Al-Dani and Al-Irshad by Al-Falanisi, as the first of them was specialized.
Satisfy the second with the ten readings
May God bless my time, through His grace and generosity, to achieve this treasure and to publish it
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreThe aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.