Preferred Language
Articles
/
jbcd-2717
Comparison between the effects of Aloe vera and chlorhexidine on clinical periodontal parameters
...Show More Authors

Background: Periodontal diseases are one of the major dental pathologies that affect human populations worldwide at high prevalence rates The term periodontal disease usually refers only to plaque related inflammatory disease of the dental supporting tissues. Mouth rinses which act as an anti-plaque agents mostly used as adjuncts to oral hygiene. Aims of the study: To Estimate and compare the effects of Aloe vera relative to chlorhexidine on the clinical periodontal parameters (plaque index, gingival index, bleeding on probing). Material and method: A total of 44 subjects with plaque-induced gingivitis, baseline of data were collected for (PLI, GI, and BOP) and underwent oral hygiene instruction, scaling and polishing, then divided into: Study group I : 15 patients instructed to use Aloe vera mouth wash (100% pure Aloe vera juice) for home application twice daily for 7 days. Study group II: 15 patients instructed to use chlorhexidine (0.2%) mouthwash twice daily for 7 days. Control group: 14 patients instructed not to use any adjunct. Results: PLI and BOP showed significant differences between 1st and 2nd visits in all groups with the larger effects were found in chlorhexidine followed by Aloe vera while the lowest change was found in control group. GI showed significant change between 1st and 2n visits in study groups (chlorhexidine and Aloe vera groups) with the larger effects was in chlorhexidine group, while there was no significant changes were found in control group. Conclusion: chlorhexidine remain the bench mark control as adjunct to periodontal therapy but Aloe vera can be used as alternative to chlorhexidine when it cannot be used.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Science
A CRYPTOGRAPHIC TECHNIQUE BASED ON AVL TREE
...Show More Authors

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 15 2025
Journal Name
International Journal Of Cloud Computing And Database Management
Deep video understanding based on language generation
...Show More Authors

Vol. 6, Issue 1 (2025)

View Publication Preview PDF
Publication Date
Sat May 03 2025
Journal Name
Aip Conference Proceedings
On a graph associated to Ly group
...Show More Authors

For the graph ⁠, the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.

View Publication
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Role of the Faculty of Education in Serving the Community in the Light of the Vision of the Kingdom 2030 from the Faculty Members’ Point of View at the University of Jeddah
...Show More Authors

The study aimed at identifying the role of the Faculty of Education in the community service in light of vision of the Kingdom 2030 from the faculty members’ point of view at the University of Jeddah. The study used a descriptive method through a questionnaire administered to a sample of the faculty members.It concluded that the role of the College in serving the community is the development of the right habits in the family and the importance of establishing bridges of cooperation between the Faculty of Education and the surrounding environment and teaching special education teachers how to apply some methods of measurement to determine the needs of students with disabilities. The results also pointed out that there are no statistical

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Evaluation of Illustrations Images in the Content of the Computer Book for the Second Intermediate Grade from the Point of View of the Teachers of the Subject
...Show More Authors

The research aims at evaluating the illustrations images and determining the availability of good image standards in the illustrations images of the content of the second intermediate stage computer's book for the academic year (2019-2020) as seen by computer teachers. The sample was randomly selected, (30) teachers who are actually teaching the subject in schools within the geographical area of the province of Baghdad (Karkh III). To achieve this goal, ten standards were identified: scientific accuracy, suitability for the level of students, image clarity, image freshness, quality of coloring, suitability of its location of the subject, Matching their content glimpsed, The subject matter is appropriate in terms of area, matching its tit

... Show More
View Publication Preview PDF