Preferred Language
Articles
/
ijl-302
PDF Treatment of intraoral pyogenic granuloma with diode laser 810-980 nmarch
...Show More Authors

Background: Pyogenic granuloma is a hyperplastic benign tumor. The most common intra-oral site is marginal gingiva. It is often occurred in the second decade of life, it has a strong tendency to recur after simple excision.

The aim of study: to evaluate the therapeutic advantages of diode laser (810-980 nm) in intraoral Pyogenic granuloma management.

Materials and method: A total of 28 patients (14 men and 14 females) were enrolled in this study and had their pyogenic granuloma surgically removed using a diode laser. All of the patients were given local anesthetic and went through the identical surgical procedure (cartridge containing 1 percent lidocaine with epinephrine 1:100.000). To achieve hemostasis and minimize bleeding, the lesions were completely eliminated by sweeping the laser fiber tip across the operated site. To allow the wounds to heal, they were not sutured. Then, the specimens sent for histopathology.

Results & Conclusions: In the present study, we noticed that the scale of pain, bleeding and oedema gradually decreased during the first two visits. the measured parameters were completely disappeared after two weeks in most cases as well as the patient satisfaction and function also improved. the Patients were recalled after two weeks, the wounds had completely healed and patients were not complaining any type of discomfort. it is generally believed that poor oral hygiene and poor fitting denture may lead to recurrence. According to obtained results; removal of pyogenic granuloma with diode laser (810-980 nm) is successful, effective and reasonable alternative to conventional scalpel technique.

The aim of study: to evaluate the therapeutic advantages of QuickLase dentalase diode laser(810-980 nm) in intraoral Pyogenic granuloma management.

Materials and method: A total of 28 patients (14 men and 14 females) were enrolled in this study and had their pyogenic granuloma surgically removed using a diode laser. All of the patients were given local anesthetic and went through the identical surgical procedure (cartridge containing 1 percent lidocaine with epinephrine 1:100.000). To achieve hemostasis and minimize bleeding, the lesions were completely eliminated by sweeping the laser fiber tip across the operated site. To allow the wounds to heal, they were not sutured. Then, the specimens sent for histopathology.

Results & Conclusions: In the present study, We noticed that the scale of pain,bleeding and oedema gradually decreased during the first two visits. the measured parameters were completely disappeared after two weeks in most cases as well as the patient satisfaction and function also improved. the Patients were recalled after two weeks, the wounds had completely healed and patients were not complaining any type of discomfort. it is generally  believed that poor oral hygiene and poor fitting denture may lead to recurrence. According to obtained results; removal of pyogenic granuloma with QuickLase dentalase diode laser (810-980 nm) is successful ,effective and reasonable alternative to conventional scalpel technique.

Keywords: pyogenic granuloma, QuickLase, benign hyperplasia, laser institution, Baghdad.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Assessment the Genotoxic Potential of Fluoxetine and Amitriptyline at Maximum Therapeutic Doses for Four-Week Treatment in Experimental Male Rats
...Show More Authors

Abstract

At any moment, the continuous usage of medications can accompanied by DNA damage and the accumulation of such damages can cause serious consequences. Antidepressants are long-term used drugs and the incidence of their genotoxic impacts cannot be excluded. Therefore, this work was designed to investigate the possible genotoxic effects of the commonly used antidepressants (fluoxetine and amitriptyline) in adult male rats.

Detection of DNA damage in individual cells was assessed by comet and micronucleus assays in three different cell populations i.e. liver, testis and bone marrow tissues of 24 swiss albino adult male rats. The animals were randomly allocated into three groups of 8 rats ea

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
The Combined Effect of Q-Switched Nd:YAG Laser (532 Nm) and Safranin O on the Growth of Pseudomonas Aeruginosaand its Susceptibilityto Antibiotics and Pyocyanin Production
...Show More Authors

Twenty five samples out of sixty wound swabs taken from burn patients were identified as P. aeruginosabacteria by conventional methods. Antibiotics susceptibility tests were performed against thirteen antibiotics. P. aeruginosa samples were treated with 0.5 mg/ml of Safranin O solution then irradiated with 532nm Q-switched Nd:YAG laser at four energy densities (0.324, 0.704, 1.380, and 1.831 J/cm2) for different times of 5, 8 and 11 minutes with 5Hz repetition rate. The viability, susceptibility to antibiotic and production of pyocyanin were determined before and after irradiation. The results showed that the number of CFU/ml of P. aeruginosa decreased with increasing the dose of irradiation. Complete killing of cells was observed at 1.8

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Solving Mixed Volterra - Fredholm Integral Equation (MVFIE) by Designing Neural Network
...Show More Authors

       In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.

         

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref