Abstract Inflammation of periodontal tissues is the consequence of interaction between periodontal pathogens and immune system. This is associated with increased expression of inflammatory cytokines, which may exert destructive effect to the periodontal tissues when released over long period. The aim of this study was to chronologically track the homeostasis of oral keratinocytes following removal of periodontal pathogens. This was done by investigating expression of selected inflammatory markers and integrity of epithelial monolayers in vitro. Rat oral keratinocytes were stimulated with heat-killed Fusobacterium nucleatum and Porphyromonas gingivalis over 7-days then bacteria were washed away and epithelial cells re-cultured for 3-days. Expression of IL-1β, IL-6, and IL-8 was measured by ELISA while transcription of tissue inhibitor of metalloproteinase-1 (TIMP-1) and matrix metalloproteinase -8 (MMP-8) was measured by polymerase chain reaction before and after removal of bacteria. Integrity of epithelial sheet was investigated by using transepithelial electrical resistance. Data showed general downregulation of IL-1b, IL-6, and IL-8 associated with restoring transcription of TIMP-1 and MMP-8 to normal level following removal of bacteria from epithelial cultures. However, expression of IL-8 and MMP-8 remained significantly higher than unstimulated epithelial cells despite withdrawal of F. nucleatum and P. gingivalis respectively from oral keratinocytes cultures. In addition, integrity of epithelial barrier function remained compromised even after removal of P. gingivalis. Results suggest that even after three days following removal of periodontal pathogens, oral keratinocytes sustained persistent upregulation of certain inflammatory markers that could compromise integrity of epithelial barrier function.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreNew developments imposed different patterns of interactions between major international powers and Iran during 2018, ranging to varying degrees between cooperation and tension, the most important of which is the new measures taken by the United States to withdraw from the nuclear agreement and impose new US sanctions on Iran, which in turn insisted on not responding to pressure to which they are exposed to make changes in their policies and to negotiate again about the main contentious files, especially the nuclear program and ballistic missiles, and the roles they play for crisis countries, especially supporting some armed organizations in Syria, Lebanon, Iraq and Yemen. These differences have put the international forces before difficult
... Show MoreBackground: Metal ions can be released from metallic orthodontic appliances due to corrosion in the oral cavity; prophylactic mouthwashes may have an effect on ion release from orthodontic wires. Materials and Methods: Thirty six orthodontic sets of half maxillary fixed appliance with 2 types of arch wires SS and NiTi(Morelli) were constructed and immersed in 2 types of mouthwashes; Claradone (non-fluoridated) and Silver Care (fluoridated) for 28 days at 37°C, then the released Ni and Cr ionswere measured using atomic absorption spectrophotometer and compared statistically. Results: Ni ion release was higher from NiTi wire group than SS wire group for both mouthwashes and also was higher for Silver Care group than for Claradone group.
... Show MoreVirtual platforms are online classes used in teaching and learning EFL that let both teachers and students connect, communicate and cooperate online in real time. Learners get access to educational possibilities at home easily. Virtual classes can be conducted using a variety of techniques, including video conferencing, Google Meet, Zoom, conversations, reactions, and screen sharing. Users can access these programs on a range of gadgets, including laptops, tablets, and smartphones. The COVID-19 coronavirus pandemic affected all educational institutions, including schools, colleges, and universities. Our Iraqi educational institutions have been switched to use virtual platforms in this pandemic, much as all other foreign institutions
... Show MoreThe study evaluated the recovery performance of any home herbs group as first aid in some emergency cases. The study involved 10 items of herbs (chamomile, black pepper, cloves, cinnamon, and anise) which used in acute cases such as cold, colic, inflammation of the intestine and tonsillitis, and (hibiscus, catnip, dried lime, cress seed, and ginger) were used for chronic cases such as hypertension, cardiovascular disease, and arthritis. The results showed the herbs had healing power and efficiency in the primary remedy for the above-mentioned diseases. The side effects, the contradictions, and the overdoses of these substances were discussed. It was concluded that home herbs could be used for treatment in emergency cases until moder
... Show MoreThe appearance of Mixed Mode Oscillations (MMOs) and chaotic spiking in a Light Emitting Diode (LED) with optoelectronic feedback theoretically and experimentally have been reported. The transition between periodic and chaotic mixed-mode states has been investigated by varying feedback strength. In incoherent semiconductor chaotically spiking attractors with optoelectronic feedback have been observed to be the result of canard phenomena in three-dimensional phase space (incomplete homoclinic scenarios).
Reinforced concrete (RC) slabs strengthened with carbon fibre reinforced polymer (CFRP) and subjected to flexural actions may experience many types of failure, including FRP debonding, FRP rupture and concrete crushing. Of these different types of failure modes, FRP debonding stands out as the most predominant type of failure because of its dependence on the relatively weak bond interface between the soffit of the RC member and the FRP sheet attached to it. Many anchorage systems have been developed to enhance the performance of strengthened systems, one of which is the hybrid anchor, which combines the effects of patch anchors and spike anchors. Hybrid anchors have shown significant enhancement when used with RC members subjected to shear
... Show MoreThis study aims at finding out the sentimental smartness of the kindergarten children
and its relationship with some variables.
1- The level of the sentimental smartness of the kindergarten children.
2- Investigating the Zero hypothesis in that there are no significant statistical differences in
the sentimental smartness between the kindergarten children according to the sex variables
(males and females).
Some statistical tools have been used in order to arrive at the results that verify the
hypotheses of this study. The researcher uses (1) the distinctive power between two
distinctive groups; (2) the relationship between the item and the total degree (Pearson
correlation factor); and (3) Elfakronbach formula t
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreSamples (4th) reviewed are deposited and stored in the Iraqi Natural History Museum (INHM), and there are 4th of them. Sciurus anomalous (Güldenstädt, 1785) species are preserved and mummified. It is a Caucasian squirrel (S. anomalus) that was medium in size, with a grayish-to-chestnut color, a golden gray back, and a golden tail. It is found in the forests of East and Southeast Asia. The variety possessed for the study was previously registered in the vertebrate literature by several authors and was stored by scientific methods in the museum. As a result of the multiplication and growth of these species, and to know the environmental changes that occurred in them, they were compared with models and samples found throughout Iraq
... Show More