Background: Interleukine-2 is a multifunctional cytokine, considered a central regulator of host resistance against a variety of pathogens and has been recently demonstrated to exert an active role in the pathogenesis of periodontal diseases. The purpose of this study was to evaluate the effect of scaling and root planning on level of IL-2 in serum and saliva of patients with chronic generalized periodontitis, in relation to clinical parameters. Materials and Methods: A total of 50 subjects were enrolled, of which 25 had chronic generalized periodontitis and 25 periodontally healthy subjects as control. The clinical parameters included: gingival index, pocket probing depth, clinical attachment level and bleeding on probing. The level of
... Show MoreFinancial institutions, including banks, remain a major target for money launderers in order to transfer illegal funds to legitimate funds through limited internal audit procedures and external auditing.
The study is a study of the operations of money laundering and what can be done by the verification efforts when integrated in the fight against them, by analyzing the level of cooperative relationship and communication between them. To achieve the objectives of the study, a questionnaire prepared for this purpose was distributed to an appropriate sample of (60) auditors of the internal audit staff of the Central Bank of Iraq and the external auditors working in the Federal control foundation Accordingly , appropriate methods wer
... Show MoreOne of the most important , compound which have active hydrogen is the compound possessing (thiol group) Biphenyl-4,4-dithiol is agood example utilized in a wide field for preparation mannich bases , avariety of new acetylenic mannich bases have been Synthesized and all proposed structure were Supported by FTIR , 1H – NMR, 13C-NMR , Elemental analysis and microbial study .
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreNew N2O2 donor kind Schiff basehas been destined and structured by reaction Ampyrone with O-hydroxyacetophenone and Anthranilic acid. The metal complexes of the Schiff base with Mn(II), Hg(II), Ni(II), Cu(II), and Co(II) metal ions were designed and characterized by magnetic susceptibility, elemental analyses, molar conduction, IR, and 1H NMR,UV-Vis spectral metrics.The UV-Vis. and magnetic susceptibility data of the complexes suggest a square-planar, tetrahedraland octahedral geometries around the central metal ions. All elaborations were accomplished after determination the optimum molar concentration and pH which followed law of Lambert-Beer's in the researches pH scopes. The composition of these complexes were conclude dapprobating to t
... Show MoreObjectives: The study aims at finding the effectiveness of dietary habits on urolithiatic patients at Urinary Units
in Baghdad Teaching Hospitals.
Methodology: A quantitative descriptive study was conducted to identify the effectiveness of dietary habits on
(100) of urolithiatic patients in Urinary Units at Baghdad Teaching Hospitals starting from May 2011 to Sep.
2012.Data were collected through the use of constructed check list of the questionnaire format, which
consists of two parts: - The first part: is related to the patient's demographic variables ; the second part: is
constructed to serve the purpose of the study (effectiveness of the dietary habits). The total number of items
of the questionnaire is (69) item