Background: Green Tea is made from the leaf of the plant “Camellia sinensisâ€. Green tea is reported to contain thousands of bioactive ingredients including catechins which have shown great promise for having antimicrobial effects. Periodontal diseases represent one of the most prevalent diseases around the world and the main etiologic factor behind it, is plaque accumulation, in addition certain kinds of bacteria have been detected frequently in subjects suffering from periodontitis, Several studies suggested that the outcome of periodontal treatment is better if particular pathogens including Aggregatibacteractinomycetemcomitans can no longer be detected after therapy. Materials and Methods: plaque samples were collected from 20 patients suffering from chronic periodontitis with probing pocket depth of at least 6 mm, Aggregatibacteractinomycetemcomitans (A.A) was isolated and diagnosed according to morphological characteristics and biochemical tests. Green tea leaves were extracted by using water and alcohol. The first experiment involved testing the sensitivity of A.A to different concentrations of the extracts using agar well diffusion method,the second experiment involved determination of the minimum inhibitory concentration and then determination of the minimum bactericidal concentration of the extract against the bacteria, laboratory analysis of green tea extracts using high pressure liquid chromatography (HPLC) was performed. Results: Both green tea extracts were effective in inhibition of Aggregatibacteractinomycetemcomitans using agar well diffusion method, 90% and 100% concentrations of alcoholic extract showed larger inhibition zones than chlorhexidinegluconate 0.2% with statistically significant difference, CHX showed higher inhibition zones than all aqueous extract concentrations.The MIC (minimum inhibitory concentration) of alcoholic green tea extract that inhibit Aggregatibacteractinomycetemcomitans growth was 60%, The MIC of aqueous green tea extract that inhibits Aggregatibacteractinomycetemcomitans growth was 70%.The MBC (minimum bactericidal concentration) of alcoholic green tea extract that killsAggregatibacteractinomycetemcomitans was 80%, the MBC of aqueous green tea extract that kills Aggregatibacteractinomycetemcomitans growth was 90%. HPLC analysis of aqueous and alcoholic green tea extracts revealed that alcoholic extract contained higher concentration of EGCG while aqueous extract had higher content of catechin and epicatechin. Conclusion: Green tea extracts were effective against Aggregatibacteractinomycetemcomitans, alcoholic green tea extract showed inhibition ability more than the aqueous green tea extract and more than CHX and it showed bactericidal activity at 80%,90% and 100% concentrations.
In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreThe issue of freedom is the most prominent and distinctive issue of Western thought, which it reached after a long struggle. The English thinker John Stuart Mill is considered the most prominent Western thinker who elaborated on the issue of freedom, until his ideas on the issue of freedom became the semi-final formula for issues of freedom in Western thought, which revolve in their entirety on The individual has complete freedom as long as it does not harm others, and this freedom is controlled by law.
And if the freedoms he offered were not considered an achievement in Western thought; Freedom in Islam is a central and fundamental issue, and the details of freedoms in Islam have not been accomplished by anyone, but rather came
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Image pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show MoreForeground object detection is one of the major important tasks in the field of computer vision which attempt to discover important objects in still image or image sequences or locate related targets from the scene. Foreground objects detection is very important for several approaches like object recognition, surveillance, image annotation, and image retrieval, etc. In this work, a proposed method has been presented for detection and separation foreground object from image or video in both of moving and stable targets. Comparisons with general foreground detectors such as background subtraction techniques our approach are able to detect important target for case the target is moving or not and can separate foreground object with high det
... Show MoreA Multiple System Biometric System Based on ECG Data
Abstract Globalization dominated in the last decade of the twentieth century and the eve of the third millennium over economic,politics,psychology,culture,communications and information sciences,it's a historical phenomenon refer to many important transitions in humanitarian life.It foxes on that state has illusion its historical role in the psychologist,economic and political buldings. Globalization issue and its influence in North Korea put a spotlight on political,economic and cultural situations,the political system resists any change with many limitations on political freedoms,human rights and political multiplicity.Libralism trends and free market are so weaken when it comparing within the bad economic situation of the coun
... Show MoreIn this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.
The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.