Background: Human teeth considered to be an important etiological host factor in relation to dental caries through its morphology and composition. Elements may incorporate in tooth structure during pre and post-eruptive period changing the resistance for caries. The aims of this study were to determine the concentration of selected major (Calcium and phosphorus) and trace elements (Ferrous iron, nickel, chromium and aluminum) in permanent teeth and enamel among a group of adolescent girls in relation to severity of dental caries Material and Methods: The study group consisted of 25 girls with an age of 13-15 years old referred by Orthodontists for extractions of upper first premolars (two sides). Tooth and enamel samples were prepared for chemical analysis according to method described by Lappalainen and Knuttila (1979). Dental caries was diagnosed by both clinical and radiographical examinations following the criteria of D1-4MFS index described by Muhlemann (1976). All data were analyzed using SPSS version 19. Results: The concentration of major elements in teeth and enamel (measured in % of dry weight) showed that Ca ions were higher than P ions. On the other hand the concentration of trace elements in teeth and enamel samples (measured in ppm) showed that Al ions was the highest followed by Ferrous Fe then Ni ions, while Cr ions were the least in concentration. All elements showed statistically highly significant difference in concentration between teeth and enamel samples. Ca/P ratio was higher in enamel than tooth, but the difference was statistically not significant. Major elements (calcium and phosphorus) in tooth and enamel samples recorded negative correlations with DMFS. Trace elements except chromium ions recorded positive correlations with DMFS. They were not significant except for nickel ions in tooth and aluminum ions in enamel. Conclusions: The presence of these elements in both teeth and enamel samples indicated that these elements present in our environment; as foods, water, and air so they incorporate through out the tooth layers during the pre-eruptive period of tooth development, and incorporate the outer enamel surface during the demineralization and remineralization processes that occurs in the post-eruptive periods. Ca and p ions play an important role in mineralization of tooth and enamel. Cr ions may play a role in improving mineralization and crystallity of teeth, while Fe, Ni and Al may act as cariogenic elements.
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained
<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
Soil defilement with "raw petroleum" is a standout amongst the most across the board and genuine ecological issues going up against both the industrialized and oil country like Iraq. Along these lines, the impact of "raw petroleum" on soil contamination is one of most critical subjects that review these days. The present examination expects to research "unrefined oil"effectson the mechanical and physical properties of clayey soils. The dirt examples were acquired from Al-Doura area in Baghdad city and arranged by the "Brought together Soil Grouping Framework (USCS)" as silty mud of low pliancy (CL). Research center tests were done on contaminated and unpolluted soil tests with same thickness. The dirtied tests are set up by blending
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More