Preferred Language
Articles
/
jbcd-1445
Tooth Wear in Relation to Selected Salivary Variables among a Group of Older Adults
...Show More Authors

Background: Tooth wear is one of the most concerning problems of the current dental practice especially among older subjects. The aim of this study is to determine the severity of tooth wear and its relation with selected salivary variables (salivary pH and vitamin C level) among a group of older adults in Mosul city/Iraq. Materials and methods: All subjects (30 subjects) of both gender tookpart in the current study; sixteen of them were older adults (55-65 years) and compared with fourteen middle-aged adults (30-40 years) at Textile factory in Mosul city/Iraq. Unstimulated salivary samples were collected and salivary pH was immediately measured. Salivary vitamin C level was determined colormetrically. Severity of tooth wear was determined according to Hansson and Nilner (1975) classification. Results: Results showed that all severity scores of tooth wear revealed higher percentage among older adults than middle-aged adults. Also all tooth segment types revealed higher percentage of tooth wear among older adults than middle-aged adults. Moreover regarding the highest score of tooth wear by subjects, higher percentage of tooth wear was found among older adults than middle-aged adults. Concerning the total sample results disclosed that wear of enamel only revealed higher percentage than one or more teeth worn into dentine and one or more teeth worn up to 1/3 of the crown. Also in the total sample the incisor region showed higher percentage of tooth wear while the least tooth wear percentage was found in the molar region. In both age groups no significant correlations were found between salivary pH and vitamin C with the highest score of tooth wear. Conclusion: Tooth wear is more severe among older subjects. Further study is needed with larger sample size and more precise index that measure the etiology of tooth wear.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Formulation and Investigation of Lacidipine as a Nanoemulsions
...Show More Authors

Many pharmaceutical molecules have solubility problems that until yet consist a hurdle that restricts their use in the pharmaceutical preparations. Lacidipine (LCDP) is a calcium-channel blocker with low aqueous solubility and bioavailability.

        Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE)  is one of the popular methods that has been used to solve the solubility problems of many drugs. LCDP was formulated as a NE utilizing triacetin as an oil phase, tween 80 and tween 60 as a surfactant and ethanol as a co-surfactant. Nine formulas were prepared, and different tests performed to ensure the stability of the NEs, such as thermodyna

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (9)
Scopus Crossref
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The New Synthesis of Potassium-Exchange Zeolite A
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Microbiological studies of a new naphthoquinone semicarbazone derivatives
...Show More Authors

The antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).

View Publication Preview PDF
Publication Date
Wed May 12 2021
Journal Name
Journal Of Biotechnology Research Center
A review of the Common Food-borne Viruses
...Show More Authors

Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Development A Method For Production Of Carbon Nanotubes
...Show More Authors

In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also fou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
Analysis of a harvested discrete-time biological models
...Show More Authors

This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.

Scopus (6)
Scopus
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
A Note on the Perturbation of arithmetic expressions
...Show More Authors

In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 24 2023
Journal Name
2023 9th International Conference On Information Technology Trends (itt)
A Comparative Study of Unauthorized Drone Detection Techniques
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Semantic Exchange A study of rooting the term
...Show More Authors

The term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.

View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF