Epithelial mesenchymal transition (EMT) is a process comprising cellular and molecular events which result in cells shifting from an epithelial to a mesenchymal phenotype. Periodontitis is a destructive chronic disease of the periodontium initiated in response to a dysbiotic microbiome, and dominated by Gram-negative bacteria in the subgingival niches accompanied by an aberrant immune response in susceptible subjects. Both EMT and periodontitis share common risk factors and drivers, including Gram-negative bacteria, excess inflammatory cytokine production, smoking, oxidative stress and diabetes mellitus. In addition, periodontitis is characterized by down-regulation of key epithelial markers such as E-cadherin together with up-regulation of transcriptional factors and mesenchymal proteins, including Snail1, vimentin and N-cadherin, which also occur in the EMT program. Clinically, these phenotypic changes may be reflected by increases in microulceration of the pocket epithelial lining, granulation tissue formation, and fibrosis. Both in vitro and in vivo data now support the potential involvement of EMT as a pathogenic mechanism in periodontal diseases which may facilitate bacterial invasion into the underlying gingival tissues and propagation of inflammation. This review surveys the available literature and provides evidence linking EMT to periodontitis pathogenesis.
The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.
The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g
... Show MoreThe current research aims to find out the role of transformational leadership in decision-making wise, to cope with the decline in some of the banking performance indicators as a result of the absence of the modern concept of the leadership of those so-called B (Transformational Leadership) and preventing benefit from the advantages in the banks, and I test the research on a sample of the Iraqi private banks through applied to a sample (77) Mdermvud and Associate Director and Advisor to the Chairman of the Department, the distributors (7) banks, and used the head of the questionnaire as a tool to collect data and information. For the purpose of access to the results, the research sought to test two hypotheses two main hypotheses sub pop
... Show MoreThis research aims to solve a problem in the field of accounting and financial knowledge in the world today, that is, the problem of creative accounting. Especially after the global financial crisis and the collapse of many large companies in the world, people find that they use creative accounting methods to distinguish them from reality, showing the results of their activities and their financial status. This research discusses the concept of creative accounting, the most important methods used in financial statements and its relationship with external auditing, and procedures to limit accounting creativity. This study uses descriptive analysis methods after confirming its theoretical aspects in practice. Using the statistical
... Show MoreThis study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show More