One of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group (A) patients remained without the addition of any material, just suturing of the wound with simple interrupted sutures, while in group (B) patients, the extraction site was filled with 1 cc of 1% hyaluronic acid gel (periokin®), and in group C patients, the extraction site was filled with A-PRF. Results. Sixty-six eligible patients participated in this study; both hyaluronic acid gel 1% (periokin®) and advanced platelet-rich fibrin showed a significant reduction in pain, swelling, and trismus on the 1st, third, and seventh postoperative days when compared to the control group, while the comparison between HA and A-PRF showed no significant differences except for the pain on the third postoperative day. There was a significant pain decrease in the A-PRF group than HA group. Conclusion. Intrasocket application of 1% hyaluronic acid gel (periokin®) or advanced platelet-rich fibrin can be an effective primary way to significantly reduce postoperative pain, trismus, and edema compared to the control group following mandibular third molar surgery.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreA Multiple System Biometric System Based on ECG Data
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe goal of current research to the definition of environmental awareness in the curriculum and its role in sustainable environmental planning, was the research community official regular educational schools (kindergarten, primary, secondary) for the province of Baghdad - Iraq, the sample consisted search of (100) teacher and a teacher, and what research was descriptive analytical, researchers have selected the right tool for the research procedures (closed) questionnaire, distributed to the research sample, has been used by researchers appropriate statistical methods for procedures including: the weighted average extraction unit paragraph,
... Show MoreStudied the environment and fish life Qattan in the Euphrates River in central Iraq for the period from September 2002 until 2003 recorded the lowest temperature of the water during the month of January during the month of August ranged salinity ranges between 068
The research includes the study of the scientific miracle in the verse: (It is the one who made you the earth humiliation and walked in their positions and eat from the living and to the publication of the human body and in the Qur'an) And mental and spiritual. The research also pointed to the tight link between the miracle of the precedent in the Holy Quran and the miracle of the divine power in the book of the Infinite Universe to give each miracle testimony of delivery and ratification of the other. The research included after the introduction, the first topic included four demands, which included basic concepts: - Definition of scientific miracle and its importance in the Koran, and the significance of the universal verses in the Kor
... Show More