Preferred Language
Articles
/
jbcd-814
Antibacterial effects of green tea extracts on Aggregatibacter actinomycetemcomitans (In-Vitro study)

Background: Green Tea is made from the leaf of the plant “Camellia sinensis”. Green tea is reported to contain thousands of bioactive ingredients including catechins which have shown great promise for having antimicrobial effects. Periodontal diseases represent one of the most prevalent diseases around the world and the main etiologic factor behind it, is plaque accumulation, in addition certain kinds of bacteria have been detected frequently in subjects suffering from periodontitis, Several studies suggested that the outcome of periodontal treatment is better if particular pathogens including Aggregatibacteractinomycetemcomitans can no longer be detected after therapy. Materials and Methods: plaque samples were collected from 20 patients suffering from chronic periodontitis with probing pocket depth of at least 6 mm, Aggregatibacteractinomycetemcomitans (A.A) was isolated and diagnosed according to morphological characteristics and biochemical tests. Green tea leaves were extracted by using water and alcohol. The first experiment involved testing the sensitivity of A.A to different concentrations of the extracts using agar well diffusion method,the second experiment involved determination of the minimum inhibitory concentration and then determination of the minimum bactericidal concentration of the extract against the bacteria, laboratory analysis of green tea extracts using high pressure liquid chromatography (HPLC) was performed. Results: Both green tea extracts were effective in inhibition of Aggregatibacteractinomycetemcomitans using agar well diffusion method, 90% and 100% concentrations of alcoholic extract showed larger inhibition zones than chlorhexidinegluconate 0.2% with statistically significant difference, CHX showed higher inhibition zones than all aqueous extract concentrations.The MIC (minimum inhibitory concentration) of alcoholic green tea extract that inhibit Aggregatibacteractinomycetemcomitans growth was 60%, The MIC of aqueous green tea extract that inhibits Aggregatibacteractinomycetemcomitans growth was 70%.The MBC (minimum bactericidal concentration) of alcoholic green tea extract that killsAggregatibacteractinomycetemcomitans was 80%, the MBC of aqueous green tea extract that kills Aggregatibacteractinomycetemcomitans growth was 90%. HPLC analysis of aqueous and alcoholic green tea extracts revealed that alcoholic extract contained higher concentration of EGCG while aqueous extract had higher content of catechin and epicatechin. Conclusion: Green tea extracts were effective against Aggregatibacteractinomycetemcomitans, alcoholic green tea extract showed inhibition ability more than the aqueous green tea extract and more than CHX and it showed bactericidal activity at 80%,90% and 100% concentrations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

Crossref (1)
Crossref
View Publication
Publication Date
Fri May 01 2020
Journal Name
Journal Of Electrical And Electronics Engineering
HF Wave Propagation Prediction Based On Passive Oblique Ionosonde

High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the

... Show More
Scopus
View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
ON Weak g *sD -Sets And Associative Separation Axioms

   In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
 

View Publication Preview PDF
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalized Γ-n-Derivations on Prime Γ-Near-Rings
Abstract<p>The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and <italic>K</italic> be a nonzero semi-group ideal of <italic>G</italic> which force G to be a commutative ring.</p>
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Retrieving Mobile Phone Information Based on Digital Search Tree

     The current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Human Resources Accounting And its Reflection on Quality Cost

The development of human resources training programs can assist in agreat deal in creating products of high quality with quantitive advantage for the economicunit;through the sale of products by prices higher of the peer products price in the arket,or decreasing production costs which lead into increusing the unet  profits. for these reasons, the human resources have got great importance for their great role in  any economy,and they havestarled to consentrate on accounting these resource.From this point of view, this research has handied human resources accounting and their effect on quality costs.  In(MID-Refinery Company),quality costs are determined ,then we have larified the reality of training and development in the o

... Show More
View Publication Preview PDF