Objectives. This study aimed to evaluate the impact of nonnutritive sucking habits on the presence of oral Escherichia coli. Methods. One hundred and twenty children aged 3–5 years old were enrolled in the present case-control study, as follows: 60 children with continuous pacifier and thumb sucking habits (study group) and 60 children without any sucking habits (control group). The children in the two groups were matched in terms of age and gender. Information was gathered from the parents concerning their children using a special sheet. Sterile swabs were taken from both groups and cultured on agar plates. Then, they were subjected to further biochemical tests to identify E. coli species. The mean of the E. coli count was determined for each child. Descriptive, independent t-test and chi-square test statistics were used. The level of significance was set at
The objective of this in vivo study is to investigate the effects of 337.1 nm pulsed N2 laser on cellular immune response represented by lymphocyte transformation capacity and phagocytosis activity in laboratory animals. The samples include 60 adult male BALB/c mice, were divided into control group and experimental groups. The experimental groups were divided into two main groups according to the time period after N2 laser irradiation. Each group was divided into 9 subgroups which exposed to N2 laser radiation at different values of pulse repetition rates and exposure times. The results of immunological tests demonstrated that the exposure to 180 J/cm2 of N2 laser radiation induce adverse effect to cellular immune response. The results o
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreCalcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition effic
This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show More