Background: Eucalyptus extracts and derivatives are natural substances with potent antimicrobial properties. This study investigated the in- vitro effects of non-nutritive sweeteners on the antifungal activity of alcoholic and aqueous Eucalyptus extracts against Candida albicans, a common oral pathogen. Materials and Method: Ten isolates of Candida albicans were isolated from dental students’ salivary samples. The alcoholic and aqueous extracts were prepared from fresh Eucalyptus leaves using maceration. The sensitivity of Candida albicans isolates to various concentrations of Eucalyptus extracts ranging from 50 to 250 (mg/mL) was evaluated via agar well diffusion method, while the agar streaking method was used to assess the minimum fungicidal concentration (MFC). In addition, the effect of non-nutritive sweeteners on the MFC of the extracts was investigated. Results: The Eucalyptus extract-sensitive Candida albicans isolates showed an increase in inhibitory zone width with increasing extract concentration. Regarding their antifungal effectiveness, clear disparities were observed among extract concentrations. Against Candida albicans, the MFC for Eucalyptus alcoholic extract was 75 mg/mL, but the MFC for Eucalyptus aqueous extract was 200 mg/mL. Notably, 15% stevia and 5% sucralose did not affect the antifungal effects of the Eucalyptus alcoholic extract. The antifungal effectiveness of the aqueous Eucalyptus extract against Candida albicans was unaffected by stevia and sucralose concentrations of up to 1%. Conclusion: Significant antimicrobial action against Candida albicans is shown in Eucalyptus extracts. Results indicated that stevia and sucralose at specific quantities could be utilized as sweeteners for Eucalyptus extracts in an efficient manner without impairing the extracts’ antifungal activity.
Purpose: clarify the integrative relationship of strategic leadership skills and effective management and the role of those skills combined or individually in achieving effective management.
Research design: The researchers used the quantitative method by surveying a class sample from the heads of the executive departments in a group of Iraqi private banks, consisting of (106) individuals according to the (VUCA Prime) methodology for effective management and the ten skills model for Johansen. The questionnaire was analyzed using a model of the structural equation.
Findings: The most prominent results of the research were the presence of a weak ro
... Show More Educational services in Iraq face many problems that have reduced the efficiency of the educational process, as a result of the difficult conditions experienced by educational services in Iraq. This led to the accumulation of these problems and their exacerbation significantly over the years, as there was no fundamental solution to these problems. The study proposes a planning method for managing the educational system in Iraq, especially for the primary and secondary levels, where these negative phenomena are very prominent, especially the deficit in school buildings and the phenomenon of overcrowding in classrooms. &am
... Show MoreOral carcinoma is the 6th most common cancer in the world. MicroRNAs are small non-coding single stranded RNAs. They have been shown to be capable of altering mRNA expression; thus some are oncogenic or tumor suppressive in nature. The salivary microRNA-31 has been proposed as a sensitive marker for oral malignancy since it was abundant in saliva more than in plasma. A total of 55 whole saliva samples were collected from 35 cases diagnosed with OC their ages and gender matched with 20 healthy subjects. TaqManq RT-PCR was performed for RNA samples. Mean age was 52.23+13.73 years in cases (range:17-70 years) with male predominance represented 69%. Risk of smoking and alcoholism was highly significant. The median fold change of miR-31 was sign
... Show MoreCrimes are prohibited by law and God Almighty has forbidden them with punishment or punishment.
The punishment is the prescribed punishments that the law has determined in its place and stipulated in the Book of God or the Sunnah of His Prophet, may God bless him and grant him peace.
Ta’zir: These are the punishments that are left to the ruler to assess according to what he sees as preventing corruption on earth and preventing evil. Extrapolation has proven that all the provisions of Islamic Sharia include the interests of the people, and they are based on five matters: what is in it is preserving the religion, what is in it is preserving the soul, and what is in it is preserving the soul. It involves preserving the mind, preserv
In this research, some probability characteristics functions (probability density, characteristic, correlation and spectral density) are derived depending upon the smallest variance of the exact solution of supposing stochastic non-linear Fredholm integral equation of the second kind found by Adomian decomposition method (A.D.M)
Aim and Objectives: The objective of this study was to illustrate the link between periodontitis (PO) and endothelial dysfunction in hypertensive patients. Materials and Methods: This cross‑sectional study involved 53 hypertensive patients with or without PO compared with 28 healthy controls. On the basis of the study protocol, the participants were divided into three groups: Group (1): 24 patients with hypertension only, Group (2): 29 patients with hypertension and PO, and Group (3): 28 healthy controls. Lipid profile, endothelin‑1 (ET‑1), and high‑sensitivity C‑reactive protein (hs‑CRP) were measured. Blood pressure and body mass index (BMI) were evaluated. Diagnostic criteria of severe PO periodontal indices including plaque
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs