Preferred Language
Articles
/
HhdzwpEBVTCNdQwCB5pl
Efficacy of MMP-8 Level in Gingival Crevicular Fluid to Predict the Outcome of Nonsurgical Periodontal Treatment: A Systematic Review
...Show More Authors

Purpose: To explore whether baseline matrix metalloproteinase (MMP)-8 level in gingival crevicular fluid (GCF) (exposure) can predict the outcome (reduction in probing pocket depth (PPD) (outcome)) of nonsurgical periodontal therapy (NSPT) (manual or ultrasonic or both) in patients with periodontitis (population/problem) after 3 months. Methods: Six databases (PubMed, Cochrane library, ProQuest, Ovid, Scopus, EBSCO) were searched for relevant articles published until 30 July 2021. Retrieved articles were passed through a three-phase filtration process on the basis of the eligibility criteria. The primary outcome was the change in PPD after 3 months. Quality of the selected articles was assessed using Cochrane Risk of Bias tool (RoB2) and Risk of Bias In Non-Randomized Studies of Interventions (ROBINS-I) tools. Results: From 1306 articles, five were selected for analysis. The results showed high variations in the level of GCF MMP-8 level at baseline. The average amount of reduction in PPD was 1.20 and 2.30 mm for pockets with initial depth of 4–6 mm and >6 mm, respectively. Conclusion: On the basis of available evidence, it was not possible to reach a consensus on the ability of baseline GCF MMP-8 to forecast the outcome of NSPT. This could have been due to variation in clinical and laboratory techniques used. However, consistency in mean PPD reduction after 3 months was shown.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
paratexte in specialized literary journals : AL ADEEB AL IRAQI magazine is a model
...Show More Authors

Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 14 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Cranial base morphology in different skeletal classes (A cross-sectional lateral cephalometric study)
...Show More Authors

Background: It was stated in scientific literatures that the entire craniofacial complex is influenced by the growth of the cranial base structures. Nevertheless, many times this is not the case, and this point is subject to great controversy so the aim of this study is to evaluate the possible differences in cranial base shape and flexure between different skeletal classes for both genders and to investigate any possible correlation between cranial base variables and other skeletal base variables. Materials and Methods: The sample include 75 lateral cephalometric radiographs of Iraqi adults aged between 18-25 years (39 males, 36 females), collected from patients and undergraduate students in the orthodontic department of College of Dentist

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Promoting Clinical Breast Examination as A screening Tool for Breast Cancer in Iraq
...Show More Authors

Breast cancer constitutes about one fourth of the registered cancer cases among the Iraqi population (1)
and it is the leading cause of death among Iraqi women (2)
. Each year more women are exposed to the vicious
ramifications of this disease which include death if left unmanaged or the negative sequels that they would
experience, cosmetically and psychologically, after exposure to radical mastectomy.
The World Health Organization (WHO) documented that early detection and screening, when coped
with adequate therapy, could offer a reduction in breast cancer mortality; displaying that the low survival rates
in less developed countries, including Iraq, is mainly attributed to the lack of early detection programs couple

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (30)
Crossref (31)
Scopus Clarivate Crossref