Background: Pain is one of the most reported side effects of orthodontic treatment despite the advanced technology in orthodontics. Many analgesics have been introduced to control orthodontic pain including acetaminophen and selective and nonselective nonsteroidal anti-inflammatory drugs. The great concern about these drugs is their adverse effect on rate of teeth movement. Aims: The purpose of this study was to evaluate and compare the effect of acetaminophen, ibuprofen and etoricoxib on pain perception and their influence on the rate of teeth movement during leveling and alignment stage. Methods: Forty patients were evenly and randomly distributed in a blinded way to one of four groups: placebo (starch capsules), acetaminophen 500mg thrice daily, ibuprofen 400mg thrice daily, and etoricoxib 60mg once daily. The drugs were given one hour before bonding and archwire placement and continued for three days. A visual analogue scale was used to express pain levels before and after archwire placement, on the first, second, third, and seventh day. Little’s irregularity index was measured before bonding and at every activation visit until the end of the alignment and leveling stage. Results: All three drugs showed a lower pain level than placebo at the bonding and first activation visits. Etoricoxib showed the least pain level among other drugs followed by ibuprofen. No statistically significant differences were found between the drug groups and the placebo at the second and third activation visits. No statistically significant differences were detected between the 4 experimental groups concerning the rate of teeth movement. Conclusions: The three drugs were only effective in controlling pain during the first two visits of orthodontic treatment; and etoricoxib 60mg/day was the best. All three drugs had no influence on rate of teeth movement when used in their least recommended dose.
Background: Laser is a novel physical therapy technique used to treat various conditions, including wound healing, inhibition of bacterial growth, and postoperative wounds. High-power pulsed alexandrite laser therapy is one of the most prevalent forms of laser therapy, which is a noninvasive method for treating various pathological conditions, thereby enhancing functional capacities and quality of life. It is a modern medical and physiotherapeutic technology. Generally, the Alexandrite laser emits infrared light with a wavelength of 755 nm, allowing it to propagate and penetrate tissues. Objective: This study focused on the application of a high-power pulsed alexandrite laser in vitro to evaluate the effect of a pulsed alexandrite l
... Show MoreThe research aims to know the concept of politic behavior as one of the important behaviours in the different fields and sectors. It is considered to be part of the organizatial work to face the expected risks. It includes two group of factors personal (self –monitors, locus of control ,expectation s of success, perceived job alternatives)and organizational(promotion ,division resources,role ambiguity ,democratic decision)studied by the researcher in the frame of the relationship with the variable of display continuous trust matain which includes two variable (build trust mantain, display trust continuouness)through applied frame by random sample consists of (90)employee at Farouq State
... Show MoreBackground: Endometriosis is defined as the presence or growth of ectopic endometrial tissue outside their usual site ( the uterus). It is a common condition in women. It may occur in the ovaries, fallopian tubes, vagina and rarely, endometriosis may occur in the abdomen and lungs. Endometriosis is common among women of reproductive age. It is either primary or secondary. The triad of diagnosis is a pain with menstruation, cesarean scar and a mass in the scar.
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.