Background: The surgical extraction of impacted third molar usually results in postoperative inflammation manifested as pain, facial swelling and trismus which may cause deterioration in the patient’s quality of life. Methods: This randomized controlled study included 56 patients indicated for surgical extraction of IMTM under local anesthesia. These patients were randomly assigned into two groups: a study group that included patients who received Tibrolin® postoperatively and a control group that did not. The predictor variable was whether to use SET or not. Pain measured by the pain numerical rating scale (NRS), facial swelling, and the degree of trismus were the outcome variables. The Arabic version of the Oral Health Impact Profile 5 (OHIP5-Ar) questionnaire was used to measure quality of life (QoL) on the day of surgery (day 1) and on days 3, 7, and 13. Results: The study group demonstrated significantly lower pain scores postoperatively on day 1 and a lesser degree of facial swelling on day 3 compared to the control group, while no significant differences were observed regarding the other time intervals. There were no significant differences in the degree of trismus or QoL between the two groups. Conclusions: Tibrolin® administration following the surgical extraction of IMTM might reduce post-operative complaints in patients with surgical extraction of IMTM.
The measurement of vitamin B1 in pure and pharmaceutical formulations was proposed by using a straightforward and sensitive spectrophotometric approach. Sulfacetamide (SFA) is diazotized, then coupled with vitamin B1 in alkaline media to produce a colored azo dye complex with a stability constant of 5.597 × 105 L/mol. The product is stable, with a maximum absorption wavelength of 489.5 nm, molar absorptivity of 10108 L/mol∙cm, Sandell's sensitivity of 0.0334 μg/cm2, detection limit of 0.0135 μg/mL, and Beer's law being observed over the concentration range of 0.2–20.0 μg/mL. The stability constant and stoichiometry of the produced azo dye were calculated using the continuous variation (Job's) and mole ratio methods. The suggested ap
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis study discussed the effects of doping with silver (Ag) on the optical and structural properties of
CdO nanoparticles at different concentrations 0, 1, 2, 3, 4, 5 wt% prepared by the precipitation method. The
materials were annealed at 550˚C for 1 h. The structural, topographical, and optical properties were
diagnosed by X-ray diffraction analysis, atomic force instrument, and visible and ultraviolet spectrometers.
The results show that the average diameter of the grains depends on the percentage of added silver to the
material, as the diameter decreased from 88.8 to 59.7 nm, and it was found that the roughness increased from
5.56 to 26.5. When studying the optical properties, it was noted that th
The massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreThis paper deals with the subjective reflections of consumer values on fashion design. The consumer self is determined by the consumer's idea of himself, according to the intellectual, spiritual and social values, and these values take their intellectual reflection in the form of material values that the consumer finds in fashion design. These values are based on considerations between what is intellectual represented by the values of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The consumer self gets its material image represented in the
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show More