Background/Objectives: Nonsurgical periodontal treatment (NSPT) is the gold-standard technique for treating periodontitis. However, an individual’s susceptibility or the inadequate removal of subgingival biofilms could lead to unfavorable responses to NSPT. This study aimed to assess the potential of salivary and microbiological biomarkers in predicting the site-specific and whole-mouth outcomes of NSPT. Methods: A total of 68 periodontitis patients exhibiting 1111 periodontal pockets 4 to 6 mm in depth completed the active phase of periodontal treatment. Clinical periodontal parameters, saliva, and subgingival biofilm samples were collected from each patient at baseline and three months after NSPT. A quantitative PCR assay was us
... Show MoreThe study aimed to evaluate the antimicrobial activity using different concentrations of aqueous and alcoholic extracts of dried lemongrass leaves. Chemical phytochemical tests were performed for aqueous and alcoholic extracts of lemongrass. Antimicrobials activity was tested using agar disc diffusion method against Escherichia coli and Staphylococcus aureus. The results of the study showed that the aqueous extract of dried lemon leaves was highly effective (P≤0.05) against S. aureus, as the inhibition diameter was 22 mm for 50 dilution, while the inhibition diameter decreased to 15 mm for concentration 100. As for the alcoholic extract only, the diameter of inhibition decreased significantly (P≤0.0
... Show MoreThe path and its nodal purposes
Abstract
This study has come to indicate the doctrinal purposes of faith in this path، It was composed of an introduction and four demands، as follows:
The first requirement: the intentions of distinguishing between the ranks of people according to divine justice، as those who pass by him are different. Some of them are safe by his work، surviving from the fire، and some of them are not peace، he falls into the fire of Hell، and all of them are different in their ranks in a manner consistent with the justice of God Almighty and the works they have given themselves.
The second requirement: the purposes of divine mercy in honoring the Prophet and his nation on the path and embodying their
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreAttention increased to the topic of academic accreditation by the university as a modern philosophy by which to improve its performance and provide high-quality education. Universities and colleges in general and Iraqi universities and colleges in particular have begun interest in accreditation and desire to get it. So starting from the pursuit of the Administration and Economics College / Baghdad University in obtaining accreditation of Association to Advance Collegiate Schools of Business (AACSB) The research is present which aims to determine the level of application (AACSB) International standards at the College of Administration and Economics / Baghdad University in preparation to get its accreditation in the future. Researc
... Show MoreThe research studies the melodic and rhythmic characteristics of monologue, in addition to how it was transferred from the Arab homeland to Iraq and reviewed its most prominent performers, as well as a review of the monologue types and their propagation in the Arab homeland such as comical, dramatic, and political and guidance monologues.
The methodological framework included: the problem of the research, the importance of the research and the objective of the research which is to uncover the melodic and rhythmic structure of the monologue in Iraq. The limits of the research included the objective limit tackling the art of monologue and the spatial limit which is Baghdad
... Show MoreThis research includes the principles of the democracy، and to which extent it can contribute in establishing these principles. Democracy is not only to hold parliamentary or presidential elections but also the result of these elections wills it lead to the emergence of an integrated regime that can actually expresses the citizen's rights and to which extent those citizens can contribute in that regime and control it. Since 2005، when the first elections took place in Iraq after the US occupation of Iraq 2003، Iraqi people are looking to a rule that represented them and achieve their interests after getting rid of the totalitarian regimes and establishing an institutional regime that work by democratic means in order to achieve the so
... Show MoreIn this paper, a solar concentrator is designed in the form of a concave half-cylindrical mirror consisting of polygonal reflective surface plates. The plates are arranged to give a hemispherical shape to the design. These surfaces work to receive solar radiation and focusing by reflecting it to the receiver that is placed in front of the reflecting surfaces. The results are compared with a system consisting of a concave reflecting surface of the same dimensions to obtain a good criterion for evaluating the design performance. The results showed a low acceptance angle for the design for all the samples used due to the geometrical design nature. The optical efficiency affected by the angle of incidence greatly by
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More