Background: Green Tea is made from the leaf of the plant “Camellia sinensisâ€. Green tea is reported to contain thousands of bioactive ingredients including catechins which have shown great promise for having antimicrobial effects. Periodontal diseases represent one of the most prevalent diseases around the world and the main etiologic factor behind it, is plaque accumulation, in addition certain kinds of bacteria have been detected frequently in subjects suffering from periodontitis, Several studies suggested that the outcome of periodontal treatment is better if particular pathogens including Aggregatibacteractinomycetemcomitans can no longer be detected after therapy. Materials and Methods: plaque samples were collected from 20 patients suffering from chronic periodontitis with probing pocket depth of at least 6 mm, Aggregatibacteractinomycetemcomitans (A.A) was isolated and diagnosed according to morphological characteristics and biochemical tests. Green tea leaves were extracted by using water and alcohol. The first experiment involved testing the sensitivity of A.A to different concentrations of the extracts using agar well diffusion method,the second experiment involved determination of the minimum inhibitory concentration and then determination of the minimum bactericidal concentration of the extract against the bacteria, laboratory analysis of green tea extracts using high pressure liquid chromatography (HPLC) was performed. Results: Both green tea extracts were effective in inhibition of Aggregatibacteractinomycetemcomitans using agar well diffusion method, 90% and 100% concentrations of alcoholic extract showed larger inhibition zones than chlorhexidinegluconate 0.2% with statistically significant difference, CHX showed higher inhibition zones than all aqueous extract concentrations.The MIC (minimum inhibitory concentration) of alcoholic green tea extract that inhibit Aggregatibacteractinomycetemcomitans growth was 60%, The MIC of aqueous green tea extract that inhibits Aggregatibacteractinomycetemcomitans growth was 70%.The MBC (minimum bactericidal concentration) of alcoholic green tea extract that killsAggregatibacteractinomycetemcomitans was 80%, the MBC of aqueous green tea extract that kills Aggregatibacteractinomycetemcomitans growth was 90%. HPLC analysis of aqueous and alcoholic green tea extracts revealed that alcoholic extract contained higher concentration of EGCG while aqueous extract had higher content of catechin and epicatechin. Conclusion: Green tea extracts were effective against Aggregatibacteractinomycetemcomitans, alcoholic green tea extract showed inhibition ability more than the aqueous green tea extract and more than CHX and it showed bactericidal activity at 80%,90% and 100% concentrations.
In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg
... Show MoreAbstract : This research is a field study of international cities that hosted various events of which (Sports, Exhibitions, Scientific, Cultural) and other events, these positive impacts on the city driven by such hosts were identified. The research goal was to support hosting events to improve the hostess city and to draw future plans for further developments and to invest event’s hosting to strengthen the city’s value according to a strategic vision that looks for the future the most important conclusions are Entering events hosting is a part of urban development strategies and The most important recommendations are coordination between hosting event activities and its facilities with the infrastructure structure of the host city, its
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe main purpose of the work is to analyse studies of themagnetohydrodynamic “MHD” flow for a fluid of generalized Burgers’ “GB” within an annular pipe submitted under impulsive pressure “IP” gradient. Closed form expressions for the velocity profile, impulsive pressure gradient have been taken by performing the finite Hankel transform “FHT” and Laplace transform “LT” of the successive fraction derivatives. As a result, many figures are planned to exhibit the effects of (different fractional parameters “DFP”, relaxation and retardation times, material parameter for the Burger’s fluid) on the profile of velocity of flows. Furthermore, these figures are compa
Computer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of
... Show MoreData hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som
... Show More