Background: Pregnancy is a stressful state of increased inflammatory activity, and pregnancy – associated hormone changes can influence periodontal tissues, these inflammatory activity lead to production of inflammatory mediators. Interleukin 1 beta (IL-1β) is a potent pro-inflammatory cytokines that is consistently associated with periodontal diseases. This study was designed to determine the periodontal health status and detect the serum level of IL-1β in the healthy pregnant women at first, second and third trimester and compare it with healthy non pregnant women, and determine its correlation with different clinical periodontal parameters. Materials and Methods: Subjects included in the study were sixty six (66) healthy pregnant women with an age range of 20-35 years old. They were divided into three subgroups according to gestational age, as twenty two (22) women in each trimester. Also the sample included fifteen (15) married, non pregnant women and didn’t take contraceptive pills, as control group with same age rang of 20- 35 years. Clinical periodontal parameters were measured in this study (plaque index, gingival index, bleeding on probing, probing pocket depth and clinical attachment level). Blood samples were collected from all women under study (pregnant & non pregnant women) to asses concentrations of IL-1β by mean of enzyme – linked immune sorbent assay (ELISA). Results: Highly significant statistical differences were observed among the study groups regarding the gingival index (GI)with p-value( 0.007) and the percentages of bleeding on probing (BOP) p- value(0.00), a significant difference regarding the probing pocket depth ( PPD) with p-value (0.046) ,and non significant statistical differences regarding the plaque index (PLI), p-value(0.6) and clinical attachment level (CAL) with p-value (0.371). Interleukin 1-beta ( IL-1β) serum level showed a highly statistical significant difference among the study groups with p-value (0.00).A pregnant women showed higher level than non pregnant with a higher value in the second trimester. Conclusions: The present result revealed that the serum level of IL-1β was higher in pregnant women than non pregnant women with a highly significant difference. The IL-1β serum concentration reaches the maximum value in the second trimester of pregnancy. Nevertheless there were weak correlations between clinical periodontal parameters and serum level of IL-1β.
Infrared photoconductive detectors working in the far-infrared region and room temperature were fabricated. The detectors were fabricated using three types of carbon nanotubes (CNTs); MWCNTs, COOH-MWCNTs, and short-MWCNTs. The carbon nontubes suspension is deposited by dip coating and drop–casting techniques to prepare thin films of CNTs. These films were deposited on porous silicon (PSi) substrates of n-type Si. The I-V characteristics and the figures of merit of the fabricated detectors were measured at a forward bias voltage of 3 and 5 volts as well as at dark and under illumination by IR radiation from a CO2 laser of 10.6 μm wavelengths and power of 2.2 W. The responsivity and figures of merit of the photoconductive detector
... Show MoreThe paper deals with the marked vocabulary of Russian and Arabic language, and the extrapolated to the phraseological layer of the mentioned language systems. Specificity of the functioning of this process is presented against the backdrop of the peculiarities of the existence of Russian and Arabic languages. Attention is focused on the fact that linguistic markers should be considered as a kind of keys that represent the specificity of the experience of being experienced by an individual in ontological reality. It is asserted that marking can be revealed practically at all levels of the language polysystem, but it is especially productive on its lexical layer, in particular, on the basis of lexicology and ph
... Show MoreThe behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u
... Show MoreIn this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.
In this paper we generalize some of the results due to Bell and Mason on a near-ring N admitting a derivation D , and we will show that the body of evidence on prime near-rings with derivations have the behavior of the ring. Our purpose in this work is to explore further this ring like behavior. Also, we show that under appropriate additional hypothesis a near-ring must be a commutative ring.
The continuous growth in technology and technological devices has led to the development of machines to help ease various human-related activities. For instance, irrespective of the importance of information on the Steam platform, buyers or players still get little information related to the application. This is not encouraging despite the importance of information in this current globalization era. Therefore, it is necessary to develop an attractive and interactive application that allows users to ask questions and get answers, such as a chatbot, which can be implemented on Discord social media. Artificial Intelligence is a technique that allows machines to think and be able to make their own decisions. This research showed that the dis
... Show MoreDocument clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.