Background: C-reactive protein (CRP) is an acute phase protein that its plasma levels increase after trauma or surgery so it is used as an indicator for the level of inflammation after surgery. The objective of this study is to investigate pre- and post-operative levels of CRP in three types of oral surgical interventions (Apicoectomy, Impaction, and Impacted teeth exposure). Materials and Methods: A total number of (48) healthy individuals aged (20-60) years who needed oral surgical intervention for either (removal of impacted third molars, exposure of an impacted canine, or Apicoectomy). A 4ml venous blood was obtained from each patient at two occasions (pre-operatively at the day of operation and post-operatively after 48 hours), then centrifuged for 15 minutes at (1000x g) and finally the sera were separated and stored at (-20º C) to be used for later analysis by Enzyme Linked Immuno Sorbent Assay (ELISA). Results: There was statistically high significant increase in the level of CRP after oral surgical interventions in all types of operations (the CRP mean value pre-operatively was 2.407925 mg/L, post-operatively after 48hr was 8.486725 mg/L, and the P-value was 0.000). Also there was a high significant difference between apicectomy, impaction, and exposure operations in the level of CRP at day two postoperatively (P-value was 0.000). Conclusion: An inflammatory process develops after oral surgical interventions which necessitate the use of anti-inflammatory agents after these procedures and that the severity of inflammation measured by means of CRP levels is correlated to the degree of swelling, length, and type of the surgical procedure
In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific
... Show MoreLuminescent sensor membranes and sensor microplates are presented for continuous or high-throughput wide-range measurement of pH based on a europium probe.
In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreCrop production is reduced by insufficient and/or excess soil water, which can significantly decrease plant growth and development. Therefore, conservation management practices such as cover crops (CCs) are used to optimize soil water dynamics, since CCs can conserve soil water. The objective of this study was to determine the effects of CCs on soil water dynamics on a corn (