Background: Waterpipe tobacco smoking has become common especially among young people, Waterpipe smoking misconcepted as a safer mean of smoking, so in this study we will highlight the effect of Waterpipe smoking ‎on periodontal and oral health.‎ Materials and method. The selected ‎‎‎100 male subjects of 30-40 years, ‎categorized into 4 groups (each group ‎‎25 subject): Waterpipe smoker ‎with ‎healthy periodontium, ‎Waterpipe smoker ‎‎with chronic periodontitis, Non-‎‎smoker ‎with healthy periodontium and Non-smoker ‎with chronic periodontitis. Whole ‎unstimulated ‎saliva was collected. Clinical measurements: plaque ‎index, ‎gingival index, ‎bleeding on probing, salivary flow ‎rate ‎and ‎salivary pH were recorded‎.‎ ‎ Results. In the healthy groups: plaque index and salivary pH were ‎higher in smokers than non-smokers but with no ‎significant difference (P>0.05). While gingival index and salivary flow rate were ‎higher in smoker than non-smokers and with significant ‎difference (p<0.05). In the chronic periodontitis groups: plaque index, gingival index and salivary flow rate ‎were higher in the non-smokers than smokers and with ‎significant difference (p<0.05). While salivary pH was ‎higher in the non-smokers than smokers but with no ‎significant difference (P>0.05). Correlation between ‎weekly smoking hours with pH and salivary flow rate, in the ‎smoker healthy groups, showed ‎significant negative correlation, while plaque index showed ‎significant positive correlation at (p<0.05). But in the smokers with chronic periodontitis, only gingival index ‎significantly correlated with weekly smoking hours. Conclusion. Waterpipe smoking has a detrimental effect on the periodontium and overall oral health.
In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreAdolescent pregnancy is common health problem still found in both developed and developing countries; as adolescent may have early sexual practice or early marriage. Adolescent mothers face substantially higher maternal and perinatal morbidity and mortality than adult women. This is a randomized prospective clinical study conducted at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The objective of this work is to assess the adverse maternal, fetal and neonatal outcomes in early and late teenage pregnant mothers. Study sample consisted of 220 primigravid women with a singleton, cephalic, viable fetus and no congenital abnormality that gave birth at Al-Elwiya Maternity Teaching Hospital, Baghdad, Iraq. The 1stgroup: early teenage (46 w
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
Muslim scholars have fought in the extent of regard to these interests, each according to his opinion and according to his evaluation, and his consideration of this interest, but it remains important that the legislation in them needs more precaution and caution against the predominance of passions, because the passions often decorate spoilers so they see an interest, so practical application must To realize the spirit of Islamic Sharia in its entirety of its rulings, and the preponderance between the interests and evils that prevail in our societies, which c
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More