Background: Periodontal disease (PD) is a chronic inflammatory condition characterized by destruction of supporting structures of the teeth. Intelligence quotient (IQ) was potentially reported to significantly associated with prevalence of gingivitis. Mild gingivitis was obtained in high IQ levels while moderate gingivitis may be attributed to poor oral hygiene seen among the subjects having low IQ levels. Method: One hundred volunteers aged between 20-45 years old were enrolled in this study, patients were equally divided into right- and left-handed (50 patients each)and each group then subdivided into patients with healthy gingiva(10), patients with gingivitis (20), and patients suffering from periodontitis (20).An IQ questionnaire was prepared to be answered by each patient, Periodontal health status was recorded by using clinical periodontal parameters, plaque index (PLI)and gingival index (GI). Results: Analysis of data showed that there is no significant difference in parameters measured in the same group. Results of IQ score among healthy, gingivitis and periodontitis groups indicated presence of significant difference (P≤0.001) between right- and left-handed as compare to healthy subjects, Furthermore, in left-handed patients, IQ score was significantly higher (P≤0.05) in gingivitis group in comparison to periodontitis patients. In contrast, same groups in right-handed patients showed almost the same IQ score. The same pattern was observed in association with plaque index. Conclusion: Left-handed individuals have higher potential in providing plaque control. However, IQ score did not affect oral hygiene level with increased severity of periodontal disease in both groups.
Abstract
Suffering the human because of pressure normal life of exposure to several types of heart disease as a result of due to different factors. Therefore, and in order to find out the case of a death whether or not, are to be modeled using binary logistic regression model
In this research used, one of the most important models of nonlinear regression models extensive use in the modeling of applications statistical, in terms of heart disease which is the binary logistic regression model. and then estimating the parameters of this model using the statistical estimation methods, another problem will be appears in estimating its parameters, as well as when the numbe
... Show MoreThe research aims to shed light on the obstacles that hinder the use of taxpayers' commercial books covered by provisions of the amended commercial book-keeping system No. 2 of 1985 and ways to address these obstacles. On this basis, the main null hypothesis was formulated that there is no statistically significant relationship between the obstacles to the adoption of the commercial books and taxable income.
The research data were collected on the base of three applied case studies of registered taxpayers in the General Commission of Taxes, GCT, together with the use of a questionnaire distributed to a sample of taxpayers ( companies ). The collected data were analyzed, the result were presented and the hypothesis was
... Show Moreعند إطلالتنا على هذا البلد العربي لابد من التقصي ولو بعجاله عن اقتصاده وهو الاهم باعتبار ان الاقتصاد هو شريان الحياة لأي أمة فلا غنى ولا تهاون في نفس الوقت عن هذا الجانب المهم الذي يرتبط مدى تطوره بتطور البلد وهذا الاخير مرتبط بما متوفر لديه من موارد بشريه ومادية وان تفاوتت النسبة بينها فلا ضير في ذلك فالاهم هو وجود الموجه والمخطط بالاتجاه الصحيح نحو الاستغلال الامثل لهذه الموارد
(وان قلّتْ) وبالتالي
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreFor many years it was argued that there may be a gender differences in adverse drug reactions (ADRs). This assumption was based on many possible factors such as hormonal or behavior differences, and it was not clearly identified since the female gender was not preferred to be enrolled in many clinical trials. The primary aim of this study was to assess the extent of possibly relevant gender differences in drug–ADRs regarding causality, severity, preventability, seriousness, expectedness and outcome. While the secondary aim was to assess for which group of drugs and for which ADRs gender differences are identified most often. The study was a retrospective one that depends on processing a specially selected group of data obtained from th
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreIn this paper, the effect size measures was discussed, which are useful in many estimation processes for direct effect and its relation with indirect and total effects. In addition, an algorithm to calculate the suggested measure of effect size was suggested that represent the ratio of direct effect to the effect of the estimated parameter using the Regression equation of the dependent variable on the mediator variable without using the independent variable in the model. Where this an algorithm clear the possibility to use this regression equation in Mediation Analysis, where usually used the Mediator and independent variable together when the dependent variable regresses on them. Also this an algorithm to show how effect of the
... Show MoreThe study aimed to evaluate Glucagon-Like Peptide-1 levels in Polycystic ovary syndrome (PCOS) infertile female with Diabetes Mellitus (DM) and compare the results with control group, also, to find the correlation for GLP-1 with Luteinizing hormone (LH), Follicle stimulating hormone (FSH) and LH/FSH ratio that may be used in prediction atherosclerosis in these patients. The study included nineteen women with age ranged (30-40) years and BMI ranged between (30-35) Kg/m 2. Subjects were divided into two groups: group (1) consist of (45) females as a healthy control and group (2) consist of (45) infertile females with PCOS and DM as complication. Fasting serum glucose was determined by using commercial kits (Biolabo SA-France); LH, FSH, prolac
... Show More