Background: The association between oral microbial infection and systemic disease is not a new concept. A major confounding issue is that oral infections often are only one of the many important factors that can influence systemic diseases .Objective: This study was conducted to evaluate the periodontal health status of patients with acquired coronary heart disease. Type of the study: Cross-sectional study.Methods: The study group consisted of 200 patients with an age range (35-70) years, having coronary heart disease .This study group were compared to a control group of non-coronary heart disease (200 individuals ) matching with age and gender. The oral parameters were examined including the periodontal conditions, assessment of periodontal loss of attachment as well as the missing teeth according to the World Health Organization criteria (1997)(1) were followed for diagnosis and recording of oral health status.Results: Results of the present study show that the total sample had a highly significantly periodontitis and periodontal loss of attachment with advancing age (P<0.01), while no statistically significant differences were found between males and females with periodontal condition and periodontal loss of attachment among the study group (P>0.05), while there was significant differences among their corresponding controls (P<0.05). High percentage of missing teeth was recorded among the study and control group. Highly statistically significant differences were seen between study and control groups in all the degree of severity related with periodontal conditions (P<0.001).Conclusion: The data showed that 50.5%, 35% of the control group were with periodontal disease and loss of attachment respectively compared with study group 68%, 58.5% . The present study indicate that periodontal disease more common among patients with CHD than among controls matched for age and gender. Thus the possibility that chronic oral infection or similar factor may he positively associated with CHD at least in form patients susceptible to CHD.Although causality cannot be inferred from the present data, the observed association between chronic oral infections and CHD for susceptible patients in the present study can not be excluded
F index is a connected graph, sum of the cubes of the vertex degrees. The forgotten topological index has been designed to be employed in the examination of drug molecular structures, which is extremely useful for pharmaceutical and medical experts in understanding the biological activities. Among all the topological indices, the forgotten index is based on degree connectivity on bonds. This paper characterized the forgotten index of union of graphs, join graphs, limits on trees and its complements, and accuracy is measured. Co-index values are analyzed for the various molecular structure of chemical compounds
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreA disagreement has arisen among scholars regarding the ruling on historical statues and monuments in Muslim countries, especially after the Taliban blew up some huge historical statues, and we have witnessed different positions that reach the point of contradiction, each claiming to be right, and now that the crisis has passed and the intensity of the dispute has subsided, I see It is appropriate to discuss this issue calmly, without drifting behind this or that party, to find out the legal position on these statues and monuments.
I presented the most prominent modern opinions related to the subject and discussed them in this research, which I called (Sharia’s position on historical statues and monuments), in which I tried to reach
Diesel generators is widely used in Iraq for the purpose of maintaining electric power demand. Large number of operators engaged in this work encounters high level of noise generated by back pack type diesel generators used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known., in present research , quastionaire was adsministered 86 repondents in Baghdad city were exposured to wide range of noise level (80-110) dB(A) with different ages and they have different skill discretion levels. Noise levels A-weigthed decibles dB(A) were measured over 8 weeks two times aday during the 2019 summer using a sound level meter.For predicting the wo
... Show MoreThe subject of the tagged research (becoming and integration of the film in postmodern cinema) is summarized by studying the transformations and complementarity of the film in light of the emergence of the concern of postmodernism. Then the need for it, as well as the objectives of the research and clarify its limits, as well as its importance. Then the transition to the theoretical framework, which included two sections, the first topic was entitled: Postmodern Cinema Formation and Completion, while the second topic was entitled: Paradox in Postmodern Film.
After completing the theoretical aspect, the research concluded with a number of theoretical framework indicators that were adopted as a tool for analyzing the sample, then th
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThe aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and
... Show MoreIn mammals, the kidneys originate in an embryo from the mesoderm through three excretory organs, namely: Pronephros, Mesonephros, and Metanephros. After the formation of Metanephros is completed, the kidneys begin to form nephrogenesis through mesenchymal cells located at the tip of the ureteric bud, that contribute in the formation of glomerulus and Renal tubules. The stages of glomerulus formation in the embryo of albino mice at the age of 14 to 19 days of gestation were studied. It was obtained after the sacrifice of the expectant mother and the kidneys were excised from the embryos and fixed using Aqueous Bouin's solution, Microscopic slices with a thick
... Show MoreSuppose R has been an identity-preserving commutative ring, and suppose V has been a legitimate submodule of R-module W. A submodule V has been J-Prime Occasionally as well as occasionally based on what’s needed, it has been acceptable: x ∈ V + J(W) according to some of that r ∈ R, x ∈ W and J(W) an interpretation of the Jacobson radical of W, which x ∈ V or r ∈ [V: W] = {s ∈ R; sW ⊆ V}. To that end, we investigate the notion of J-Prime submodules and characterize some of the attributes of has been classification of submodules.
Low back pain a major causes of morbidity throughout the world and it is a most debilitating condition ,and can lead to decreased physical function ,compromised quality of life, and psychological distress. Obesity is nowadays a pandemic condition. Obese subjects are commonly characterized by musculoskeletal disorders and particularly by non-specific LBP. However, the relationship between obesity and LBP remain to date unsupported by objective measurements of mechanical behavior of spine and it is morphology in obese subjects. Key words: obesity, low back pain,