Preferred Language
Articles
/
dRbkXIcBVTCNdQwC00d0
Classic vs. Novel Antibacterial Approaches for Eradicating Dental Biofilm as Adjunct to Periodontal Debridement: An Evidence-Based Overview
...Show More Authors

Periodontitis is a multifactorial chronic inflammatory disease that affects tooth-supporting soft/hard tissues of the dentition. The dental plaque biofilm is considered as a primary etiological factor in susceptible patients; however, other factors contribute to progression, such as diabetes and smoking. Current management utilizes mechanical biofilm removal as the gold standard of treatment. Antibacterial agents might be indicated in certain conditions as an adjunct to this mechanical approach. However, in view of the growing concern about bacterial resistance, alternative approaches have been investigated. Currently, a range of antimicrobial agents and protocols have been used in clinical management, but these remain largely non-validated. This review aimed to evaluate the efficacy of adjunctive antibiotic use in periodontal management and to compare them to recently suggested alternatives. Evidence from in vitro, observational and clinical trial studies suggests efficacy in the use of adjunctive antimicrobials in patients with grade C periodontitis of young age or where the associated risk factors are inconsistent with the amount of bone loss present. Meanwhile, alternative approaches such as photodynamic therapy, bacteriophage therapy and probiotics showed limited supportive evidence, and more studies are warranted to validate their efficiency.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Dentistry
The in-vitro development of novel enzyme-based chemo-mechanical caries removal agents
...Show More Authors

Objectives Bromelain is a potent proteolytic enzyme that has a unique functionality makes it valuable for various therapeutic purposes. This study aimed to develop three novel formulations based on bromelain to be used as chemomechanical caries removal agents. Methods The novel agents were prepared using different concentrations of bromelain (10–40 wt. %), with and without 0.1–0.3 wt. % chloramine T or 0.5–1.5 wt. % chlorhexidine (CHX). Based on the enzymatic activity test, three formulations were selected; 30 % bromelain (F1), 30 % bromelain-0.1 % chloramine (F2) and 30 % bromelain-1.5 % CHX (F3). The assessments included molecular docking, Fourier-transform infrared spectroscopy (FTIR), viscosity and pH measurements. The efficiency

... Show More
View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Dentistry
The in-vitro development of novel enzyme-based chemo-mechanical caries removal agents
...Show More Authors

Objectives: Bromelain is a potent proteolytic enzyme that has a unique functionality makes it valuable for various therapeutic purposes. This study aimed to develop three novel formulations based on bromelain to be used as chemomechanical caries removal agents. Methods: The novel agents were prepared using different concentrations of bromelain (10–40 wt. %), with and without 0.1–0.3 wt. % chloramine T or 0.5–1.5 wt. % chlorhexidine (CHX). Based on the enzymatic activity test, three formulations were selected; 30 % bromelain (F1), 30 % bromelain-0.1 % chloramine (F2) and 30 % bromelain-1.5 % CHX (F3). The assessments included molecular docking, Fourier-transform infrared spectroscopy (FTIR), viscosity and pH measurements. The efficie

... Show More
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Cogent Arts &humanities
An Ecostylistic Analysis of Selected Extracts from Michael Punke’s Novel The Revenant
...Show More Authors

.

View Publication
Scopus (1)
Scopus
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Synthesis of Acetylenic Derivatives of a Substituted 1, 3, 4-Thiadiazole as Antibacterial Agents
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The antibacterial evaluation of dandelion extracts as root canal irrigating solutions (A comparative study)
...Show More Authors

Background: Irrigation has a central role in endodontic treatment. Several irrigating solutions have the antimicrobial activity and actively kill bacteria and yeasts when introduced in direct contact with the microorganisms. The purpose of this study was to evaluate the antimicrobial effectiveness of Dandelion (Taraxacum officinale) root and leaf extracts as possible irrigant solutions, used during endodontic treatments, and both were compared to Sodium hypochlorite, Propolis and Ethyl alcohol. Materials and Method: Forty seven human extracted single rooted teeth were selected. The teeth were decoronated using a diamond disk to have a length of 15 mm ±1 mm and they were instrumented using the hybrid technique. All roots were sterilized

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 10 2024
Journal Name
Pharmacia
Molecular docking, ADMET, synthesis and evaluation of new indomethacin hydrazide derivatives as antibacterial agents
...Show More Authors

Bacterial infections pose an ongoing challenge due to resistance developed by infectious bacteria. So much research targeting designing new antibacterials is published annually. Our goal is to synthesize compounds that have given antibacterial activity according to molecular docking against the chosen target protein and that have acceptable ADMET properties that can be synthesized and used in the future. New 2-(5-methoxy-1-(4-chlorobenzene)-2-methyl-1H-indol-3-yl)acetohydrazide derivatives’ antibacterial efficacy against two common strains of Gram-negative and Gram-positive microorganisms has been developed, produced, and investigated. Sophisticated, modern analytical methods, including ATR-FTIR and 1H NMR spectroscopy, were used

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref