In the field of implantology, peri-implantitis is still a common complication of implant failure. Similar to periodontal disease, this kind of pathological condition is characterized by inflammation of the tissues surrounding dental implants or fillings. The sources of infection have been shown to be chronic periodontitis and poor maintenance of the communion. A thorough examination of the intricate components of peri-implantitis was sought in this review in order to identify common characteristics of the disease with regard to bacteria, biofilm formation, host immunological responses, diagnostic tools, and therapeutic treatments. The aim of this study was to provide a detailed overview of the different bacterial species associated with peri-implantitis, a clinical condition similar to periodontitis, characterized by a higher prevalence of staphylococci and enteric bacteria. The study underscores the importance of employing sophisticated diagnostic methods like cone beam computed tomography. It covers a range of therapeutic approaches including surgical and non-surgical techniques as well as strategies stressing host-modification and photodynamic treatment. The study was conducted using pertinent publications from scientific databases, including Scopus, Google Scholar, PubMed, and Web of Science. We searched these databases using the following terms: periodontitis, microbial, dental implants, peri-implantitis, and biofilm formation.
Problem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a
... Show MoreHazardous materials, heavy metals, and organic toxins released into the environment have caused considerable harm to microbes, plants, animals, and humans. Wastewater is one of the most contaminated ecosystems due to heavy metals emitted mostly by human activity. Bioremediation of wastewater is an ecologically acceptable and cost-effective method of removing heavy metals from sewage; the general purpose of this study is to analyse the dependability of anaerobic sludge biomass in removing sulfur compounds and heavy metals from waste water. The anaerobic sludge biomass evaluated in this work was taken from a wastewater treatment plant (WWTP) in Al-Rustumiya, Baghdad, and grown in the mineral medium for anaerobic growth. In serum bottl
... Show MoreIn this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.
Background: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. The fo
... Show MoreBackground: Elastomeric chains are used to generate force in many orthodontic procedures, but this force decays over time, which could affect tooth movement. This study aimed to study the force degradation of elastomeric chains. Data and Sources: An electronic search on Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, LILACS, and PubMed was made, only articles written in English were included, up to January 2022.Study selection: Fifty original articles, systematic reviews, and RCTs were selected. Conclusion: Tooth movement, salivary enzymes, alcohol-containing mouthwash, whitening mouthwash, and alkaline and strong acidic (pH <5.4) solutions all have a significant impact on elastomeric chain force degradation. T
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0
... Show MoreAbstract:
Borago officinalis is highly interesting amongst nutritional and medical source relate to its high composition of some useful phytochemical compound. It is great plants with bright blue star-shaped flowers present in most world regions and usually known as borage. The Borago phytochemical analysis showed the presence of alkaloids, tannins, flavonoids, phenolic acids, essential oil, vitamins and others. Borage is cultivated all over the world and used in traditional medicine as a demulcent, diuretic, emollient, tonic, expectorant, for the treatment of coughs, inflammation and swelling, and other diseases. In herbal medicine, Borage seed oil (BSO) has been utilized for many progressive illnesse
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.