Abstract Background: Timely diagnosis of periodontal disease is crucial for restoring healthy periodontal tissue and improving patients’ prognosis. There is a growing interest in using salivary biomarkers as a noninvasive screening tool for periodontal disease. This study aimed to investigate the diagnostic efficacy of two salivary biomarkers, lactate dehydrogenase (LDH) and total protein, for periodontal disease by assessing their sensitivity in relation to clinical periodontal parameters. Furthermore, the study aimed to explore the impact of systemic disease, age, and sex on the accuracy of these biomarkers in the diagnosis of periodontal health. Materials and methods: A total of 145 participants were categorized into three groups based on their basic periodontal examination index, with 20 in the periodontally healthy group, 50 in the gingivitis group, and 75 in the periodontitis group. Salivary LDH was measured using the rate of nicotinamide adenine dinucleotide (NADH) oxidation, to measure the kinetics of LDH activity, while total protein was measured using the Lowry method. Descriptive and analytical statistical analyses were performed to examine the associations between the variables and biomarkers. Results: The results of the study demonstrated that salivary LDH was 72% sensitive, while salivary total protein was 78% sensitive in correlation to clinical periodontal parameters. The accuracy of the test was not influenced by sex, but age had a significant effect on both biomarkers, particularly LDH. Systemic disease was another factor that significantly affected the accuracy of the test. Conclusions: Although salivary LDH and total protein show promise as biomarkers for screening periodontal disease, their interpretation may be impacted by age and systemic disease.
The study aims to build a proposed training program for school leaders in the Sultanate of Oman on the planning practices of the Kaufman model in light of the needs and challenges of reality. It also aims to identify the challenges facing school leaders in practicing the stages of strategic planning. To achieve these objectives, the study adopted the descriptive approach due to its suitability to the nature of the study. A questionnaire was used to collect the needed data. The study sample included (225) individuals from school principals, their assistants and senior teachers in post-basic education in the Sultanate of Oman. After processing the data statistically, the study concluded that the reality of planning practices for school lea
... Show MoreThe research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.
The research seeks to find out the extent of the coverage of the Mosul press to the issues of psychological and social effects of the organization "IS" on the community of Mosul, by analyzing the content of the newspapers “Economic City” and “Mosul News”. As well as to stand at the types of psychological and social effects and their repercussions on the Mosul community including figures, statistics and evidence that were covered in the theoretical study of these topics.
This study is the first scientific diagnosis to reveal the size and types of psychological and social effects of the “ISIS” organization through what was monitored by the Mosul press. The study seeks to draw the attention of officials, decision-m
... Show MoreNeed organizations today to move towards strategic thinking which means analyzing situations faced by particular challenges of change in the external environment, which makes it imperative for The Organization That to reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures, to try to achieve improvement root in the installation of the organization and methodscompletion of its work towards achieving high levels of performance and that is reflected to achieve its objectives, and this is what aims to Current search to deal with implications characteristics of strategic thinking in the stages of application re-engineering business of the company General Industries
... Show MoreQuadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der
... Show MoreThe present study aims to get experimentally a deeper understanding of the efficiency of carbon fiber-reinforced polymer (CFRP) sheets applied to improve the torsional behavior of L-shaped reinforced concrete spandrel beams in which their ledges were loaded in two stages under monotonic loading. An experimental program was conducted on spandrel beams considering different key parameters including the cross-sectional aspect ratio (
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More