Preferred Language
Articles
/
pxf_LZIBVTCNdQwCw6fp
Poly-Ether-Ether-Ketone versus dead-soft coaxial bonded retainers: a randomized clinical trial. Part 2: periodontal health and microbial biofilm assessment
...Show More Authors
Abstract<sec> <title>Background

Retainers have the potential to detrimentally impact periodontal health and contribute to tooth decay.

Objectives

To investigate periodontal health and bacterial biofilm related to Poly-Ether-Ether-Ketone (PEEK) fixed retainers as compared to Dead-soft coaxial fixed retainer (DSC).

Trial design

A two-arm parallel groups single-centre randomized clinical trial.

Methods

The trial included patients whose orthodontic treatment was completed and required retainers. Participants were randomly assigned into two retainer groups: PEEK retainers, prepared by computer-aided design and manufacturing into 0.8 mm wire form, and DSC retainers. The objectives included assessing periodontal health through plaque accumulation index (PI), bleeding on probing (BOP), periodontal pocket depth (PPD), gingival index (GI), calculus index (CI), and alveolar bone height (ABH) assessment. Biofilm assessment involved bacteriological screening of aerobic, facultative anaerobic, mutans streptococci, and lactobacilli. The periodontal indices and microbiological screening as well as were assessed at the debonding stage (T0), 1-month (T1), 3-month (T3), and 6-month (T6) after the commencement of the trial, except for the ABH, which was recorded using periapical radiograph at T0 and T6.

Blinding

Single blinding of participants in addition to the bacteriological specialist.

Results

Initially, the trial enrolled 46 participants, aged between 12 and 28 years, and were randomly assigned to two groups, with 23 participants in each group. Subsequently, one participant withdrew from the trial, resulting in a total of 45 participants whose data were analysed. Assessment of the periodontal indices, excluding the CI (P = .480), revealed statistically but not clinically significant differences between groups after 6-month of retention (P = .016 of PI, P = .020 of BOP, P = .05 of PPD, and P = .01 of GI). There was slight plaque accumulation, normal PPD (approximately 1 mm), healthy to mild gingivitis with a GI of less than 1 and BOP was around 10%. Concerning the ABH, there was a noticeable reduction in its score after 6 months, particularly in the PEEK group, although the difference was not statistically significant (P = .102). Furthermore, the bacteriological viable count did not show any significant difference between the groups during the recall visits.

Harms

There have been no reported negative consequences.

Limitations

Blinding the assessor of periodontal indices was not feasible due to the nature of the intervention. The trial follow-up duration was limited.

Conclusions

Both the PEEK and DSC retainers have comparable impacts on periodontal health and bacterial accumulation and composition during the retention period.

Trial registration

NCT05557136.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Advanced Pharmacy Education And Research
The effect of formulation and process variables on prepared etoricoxib ‎Nanosponges
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Sun Jun 09 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis, Characterization and Preliminary Anti-inflammatory Evaluation of New Etodolac Derivatives
...Show More Authors

Three new hydrazone derivatives of Etodolac were synthesized and evaluated for their anti-inflammatory activity by using egg white induced paw edema method. All the synthesized target compounds were characterized by CHN- microanalysis, FT-IR spectroscopy, and 1HNMR analysis. The synthesis of the target (P1-P3) compounds was accomplished following multistep reaction procedures. The synthesized target compounds were found to be active in reducing paw edema thickness and their anti-inflammatory effect was comparable to that of the standard (Etodolac).

View Publication Preview PDF
Scopus (18)
Crossref (6)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Ieee Antennas And Wireless Propagation Letters
Stabilized and Fast Method for Compressive-Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun May 01 2016
Journal Name
Energy Conversion And Management
Stability and thermophysical properties of non-covalently functionalized graphene nanoplatelets nanofluids
...Show More Authors

A pioneering idea for increasing the thermal performance of heat transfer fluids was to use ultrafine solid particles suspended in the base fluid. Nanofluids, synthesized by mixing solid nanometer sized particles at low concentrations with the base fluid, were used as a new heat transfer fluid and developed a remarkable effect on the thermophysical properties and heat transfer coefficient. For any nanofluid to be usable in heat transfer applications, the main concern is its long-term stability. The aim of this research is to investigate the effect of using four different surfactants (sodium dodecyl benzene sulfonate (SDBS), sodium dodecyl sulfate (SDS), cetyl trimethylammonium bromide (CTAB), and gum Arabic (GA)), each with three different

... Show More
Crossref (201)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Syntheses, Structures and Biological Activity of Some Schiff Base Metal Complexes
...Show More Authors

Four new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Determine, Predict and Map Soil pH Level by Fiber Optic Sensor
...Show More Authors
Abstract<p>Soil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.</p> ... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis, Characterization and Preliminary Anticancer Study for Methotrexate Silibinin Conjugates
...Show More Authors

The spectrum of clinical efficacy of Methotrexate (MTX) is broad in that MTX is used in the treatment of certain cancers, severe psoriasis and rheumatoid arthritis.Various mechanisms by which cancer cells grown in tissue culture become resistant to anticancer drugs. The use of multiple  drugs with different mechanisms of entry into cells and different cellular targets allows for effective chemotherapy and high cure rates. In an efforts to develop effective strategies that increase the therapeutic potential of anticancer drugs with less systemic toxicity ,are being directed  towards the investigation of dietary supplements and other phytotherapeutic agents for their synergistic efficacy in combination with anticancer drugs. A promi

... Show More
Crossref (2)
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref