Background/Objectives: Nonsurgical periodontal treatment (NSPT) is the gold-standard technique for treating periodontitis. However, an individual’s susceptibility or the inadequate removal of subgingival biofilms could lead to unfavorable responses to NSPT. This study aimed to assess the potential of salivary and microbiological biomarkers in predicting the site-specific and whole-mouth outcomes of NSPT. Methods: A total of 68 periodontitis patients exhibiting 1111 periodontal pockets 4 to 6 mm in depth completed the active phase of periodontal treatment. Clinical periodontal parameters, saliva, and subgingival biofilm samples were collected from each patient at baseline and three months after NSPT. A quantitative PCR assay was us
... Show MoreTwo series of Schiff Bases and 2,3-disubstituted-1,3-thiazolidin-4-one derivatives were synthesized . Reaction of 2-mercaptobenzothiazole with α-chloro acetic acid gave compound[I]. Esterification of carboxylic moity of compound [I] , using absolute methanol in the presence of conc . H2SO4 yielded acorresebonding ester [II] , wich was condensation with hydrazine hydrate to give acid hydrazide [III] . The new Schiff bases [V]n were synthesized by reaction of acid hydrizide with dialdehyde [IV]n in the presence of glacial acetic acid . The thiazolidinone derivatives [VI]n have been obtained from the azomethines through the addition of thioglycolic acid . Their chemical structures have been confirmed by mel
... Show MoreBacteria form complex and highly elaborate surface adherent communities known as biofilms.Biofilm have been shown to be associated with several human diseases ,and to colonize a wide variety of medical devices . The current study focuses on contribution of extracted genomic DNA in biofilm formation by P. aeruginosa and K. pneumoniae isolates .The percentages of Pseudomonas aeruginosa recovery from drinking water in this study were 10%(20 positive P. aeruginosa samples ) and K. pneumonia., 7%(14 positive K. pneumonia samples).The results showed that all P.aeruginosa and K. pneumoniae isolates (100%) were slime producer but in different degrees by forming of black
... Show MoreIn an attempt to shed a light on the possible relationship between lipid peroxidation and some antioxidant. The effect of vitamine E (as a potent antioxidant free radical scavenger) on the serum levels of Total cholesterol (TC) and Triacylglycerols (TG) was studied and the lipid peroxidation marker (MDA) was measured. The study includes (50) healthy donors from males and females who had given vitamine E at a rate of (400IU) daily for one month and were divided into two groups. 1. Group (A) : included (25) males donors (20-40) years old, before and after giving vitamine E. 2. Group (B) : included (25) females donors (20-40) years old , before and af
... Show MoreStick-slip is kind of vibration which associated with drilling operation in around the bottom hole assembly (BHA) due to the small clearance between drill string & the open hole and due to the eccentric rotating of string. This research presents results of specific experimental study that was run by using two types of drilling mud (Fresh water Bentonite & Polymer), with/without Nanoparticle size materials of MgO in various ratios and computes the rheological properties of mud for each concentration [Yield point, plastic viscosity, Av, PH, filter loss (30 min), filter cake, Mud Cake Friction, Friction Factor]. These results then were used to find a clear effects of Nanoparticle drilling mud rheology on stick - slip strength by sev
... Show MoreThe performance analyses of 15 kWp (kW peak) Grid -Tied solar PV system (that considered first of its type) implemented at the Training and Energy Research Center Subsidiary of Iraqi Ministry of Electricity in Baghdad city has been achieved. The system consists of 72 modules arranged in 6 strings were each string contains 12 modules connected in series to increase the voltage output while these strings connected in parallel to increase the current output. According to the observed duration, the reference daily yields, array daily yields and final daily yields of this system were (5.9, 4.56, 4.4) kWh/kWp/day respectively. The energy yield was 1585 kWh/kWp/year while the annual total solar irradiation received by solar array system was 198
... Show MoreIt is well known that petroleum refineries are considered the largest generator of oily sludge which may cause serious threats to the environment if disposed of without treatment. Throughout the present research, it can be said that a hybrid process including ultrasonic treatment coupled with froth floatation has been shown as a green efficient treatment of oily sludge waste from the bottom of crude oil tanks in Al-Daura refinery and able to get high yield of base oil recovery which is 65% at the optimum operating conditions (treatment time = 30 min, ultrasonic wave amplitude = 60 micron, and (solvent: oily sludge) ratio = 4). Experimental results showed that 83% of the solvent used was recovered meanwhile the main water
... Show MoreThis paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More