Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth except the third molar while the radiographic analysis using CBCT was recorded on the Ramfjord teeth, the unit of measurement was from cement-enamel junction to alveolar crest distance (CEJ-Ac distance) per site in millimeters. Results: The results obtained were a non significant difference for PLI, a significant difference of mean of GI between young smokers and non smokers. There was a highly significant difference in the general mean of CEJ-Ac distance between both groups. There was a significant difference between maxillary and mandibular teeth, a non significant difference between right and left sides among young smokers and non smokers. Conclusion: The CBCT device plays an important role in detection the incipient form of periodontitis among young smokers and non-smokers, so we concluded that there is a highly significant difference in the general mean CEJ-Ac distance between young smokers and non smokers with increase distance in the maxillary teeth than that in the mandibular teeth.
The negative impact of oral diseases on the function, economy, and general health of the population is well‐documented. In the last decades, evidence linking increased expression of depression and oral diseases/conditions has significantly increased. The aim of this study is to assess the association between oral disease/conditions and self‐reported symptoms of depression individuals.
A specially designed questionnaire was distributed via social media for 1 week. It consisted of two main sections; the first section was dedicated to collect demographic variables and self‐reported symptoms
Background: Bloody diarrhea plays a major role in
morbidity and mortality especially in developing
countries, it is usually a sign of invasive enteric
infection, there is a thought that amoebic dysentery is
more common than bacillary dysentery in Iraq, and
from 1989 to 1997 amoebic dysentery increase from
20000to 550000 patients.
Objectives: This study aims to:
1. Outline the incidence of various infectious causes of
bloody diarrhea in Erbil district.
2. Assess the effect of multiple factors like age, sex,
source of water supply, etc... On the incidence of
amebic and bacillary dysentery.
3. To provide baseline data for making strategic plan to
reduce the diarrhoeal mortality and morbidity.
Met
Abstract
The aim of the study was to examine the level of psychological pollution among Jordanian unemployed faculty of education graduates in public and private universities. The sample of the study consisted of (413) Jordanian male and female unemployed faculty of education graduates in 2017. The researcher administrated the psychological pollution scale on the sample of the study, consisting in the final format of (37) items distributing on (4) domains. Validity and reliability for the scale were obtained. The results of the study indicated that level of psychological pollution among Jordanian unemployed faculty of education graduates in public and private universities was high (M=3.48, SD=0.83). The results
... Show MoreThe current research aims to identify the fear of intimacy and post-traumatic stress disorder among Yazidi women and the correlation between them. To achieve the objectives of the research, the researcher adopted the Descutner, 1991 & (Thelen) scale, which consisted of (35) items. The researcher also adopted the post-traumatic stress disorder scale for (Davidson, 1995) translated by (Abdul Aziz Thabet), which consists of (17) items. These two scales were administered to a sample of (200) individuals. Then, the researcher analyzes the data using the Statistical Package for Social Sciences (SPSS). The results showed that the research sample of Yazidi women has a fear of intimacy. The research sample of Yazidi women is characterized by
... Show MoreBackground: Many structural or functional abnormalities can impair the production of thyroid hormones and cause hypothyroidism.Objectives: to identify the main etiological causes of hypothyroidism among patients visiting Specialized Center for Diabetes and Endocrinology.Methods: This study was conducted in the Specialized Center for Diabetes and Endocrinology on 217 patients with proved hypothyroidism, from 2006 to 2008. Every patient was tested with thyroid function tests, Ultrasound examination, thyroid autoantibodies, fine needle aspiration, radiology of skull, isotopes scan, also checking adrenal and gonadal function. Results: Out of these 217 patients 120 patients have thyroiditis 33 patients had been undergone thyroidectomy. 39 pat
... Show MoreThe culture of the daily necessities of life of the individual in any society, whether advanced or simple, and the concept of multiple aspects of culture, including what is culture and education there holds that art is culture, and there are those who are classified according to human societies .. Some also go to it is not related to the study and learning .. And has been Iraq as a symbol of Arab culture, but they declined because of what passed by political crises and social in its modern history, and aims Current search to study culture psychological, political and social among the students of the university after the U.S. occupation of Iraq, the researcher prepared a questionnaire and after hold the appropriate statistical met
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More