Background: Since the periodontal disease Index of Ramfjord (Ramfjord index) can potentially shorten the examination time by almost half, many studies evaluated Ramfjord teeth in predicting full-mouth periodontal status of an adult population. The aim of this study was to evaluate the benefit of Ramfjord teeth in predicting the full-mouth clinical attachment level of an adult population in patients attending the college of dentistry- Baghdad University. Materials and methods: The study participants were 100 patients with age range from 30-60 years old which represent group zero. The patients were divided into three main groups according to the age of the patients. Group I and group II each of them composed of 30 patients while group III composed of 40 patients. In the first time clinical attachment level (CAL) was measured from the full mouth (FM) and then from the Ramfjord teeth (RT) (teeth number: 16, 21, 24, 36, 41, 44) in all groups. Clinical attachment level (CAL) was measured in millimeters using periodontal probe. Results: The difference in the mean clinical attachment level measured from the full mouth (FM) and Ramfjord teeth (RT) by using paired t - test was non significant in all the groups. Also in all groups the correlation coefficient as well as beta coefficient was high. Conclusion: The high agreement between Ramfjord teeth and full mouth CAL confirm the epidemiological validity of Ramfjord teeth to represent the full mouth.
Ternary polymer blend of chitosan/poly vinyl alcohol/ poly vinyl pyrrolidone was prepared by solution castingmethod, nanocomposite was prepared by sonication method with nano Ag and Zn. All prepared compounds have been characterizedby FT-IR, SEM, DSC, as well as Biological activity. Antimicrobialactivity related to prepared blendsand Nanocomposites againstsix types of bacteria namely, Staphylococcus aureas, E. faecalis, S.typhi, P. aeruginosa, Bacillus subtilis, Escherichia coli andC. albicans fungal were examined and evaluated. The results reveal that the prepared polymer blends and nanocompositeshavegood antimicrobial activity against all kinds of microbials.
Let R be a Г-ring, and σ, τ be two automorphisms of R. An additive mapping d from a Γ-ring R into itself is called a (σ,τ)-derivation on R if d(aαb) = d(a)α σ(b) + τ(a)αd(b), holds for all a,b ∈R and α∈Γ. d is called strong commutativity preserving (SCP) on R if [d(a), d(b)]α = [a,b]α(σ,τ) holds for all a,b∈R and α∈Γ. In this paper, we investigate the commutativity of R by the strong commutativity preserving (σ,τ)-derivation d satisfied some properties, when R is prime and semi prime Г-ring.
This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal
... Show MoreBackground: Few updated retrospective histopathological-based studies in Iraq evaluate a comprehensive spectrum of oro-maxillofacial lesions. Also, there was a need for a systematic way of categorizing the diseases and reporting results in codes according to the WHO classification that helps occupational health professionals in the clinical-epidemiological approach.
Objectives: to establish an electronic archiving database according to the ICD-10 that encompasses oro-maxillofacial lesions in Sulaimani city for the last 12 years, then to study the prevalence trend and correlation with clinicopathological parameters.
Subjects and Methods: A descri
... Show MoreThis paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the
... Show MoreThis research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the company's relian
... Show MoreNaturally occurring radioactive materials (NORM) contaminated sites at Al-Rumaila Iraqi oil fields have been characterized as a part of soil remediation project. Activity of radium isotopes in contaminated soil have been determined using gamma spectrometer High Purity Germanium detector (HPGe) and found to be very high for Al-Markezia, Al-Qurainat degassing stations and storage area at Khadhir Almay region. The activity concentration of samples ranges from 6474.11±563.8 Bq/kg to 1232.5±60.9 Bq/kg with mean value of 3853.3 Bq/kg for 226Ra, 843.59±8.39 Bq/kg to 302.2±9.2 Bq/kg with mean value of 572.9 Bq/kg for 232Th and 294.31±18.56 Bq/kg to 156.64±18.1 Bq/kg with mean value of 225.5 for 40K. S
... Show MoreThis paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,
... Show MoreIn this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More