Background/Objectives: Nonsurgical periodontal treatment (NSPT) is the gold-standard technique for treating periodontitis. However, an individual’s susceptibility or the inadequate removal of subgingival biofilms could lead to unfavorable responses to NSPT. This study aimed to assess the potential of salivary and microbiological biomarkers in predicting the site-specific and whole-mouth outcomes of NSPT. Methods: A total of 68 periodontitis patients exhibiting 1111 periodontal pockets 4 to 6 mm in depth completed the active phase of periodontal treatment. Clinical periodontal parameters, saliva, and subgingival biofilm samples were collected from each patient at baseline and three months after NSPT. A quantitative PCR assay was used to detect the presence of Fusobaterium nucleatum and Porphyromonas gingivalis in the biofilm samples. Salivary biomarkers including matrix metalloproteinase (MMP)-9, glutathione S-transferase (GST), and Annexin-1 were assayed both qualitatively (Western blot analysis) and quantitively (ELISA). Results: NSPT yielded significant improvements in all clinical parameters, including a reduction in bacterial load and decreased levels of MMP-9 together with increased concentrations of GST and Annexin-1. The binary logistic regression suggested that the overall accuracy of P. gingivalis identification, probing pocket depth, and interproximal sites was 71.1% in predicting successful site-specific outcomes. The salivary biomarker model yielded an overall accuracy of 79.4% in predicting whole-mouth outcomes following NSPT. Conclusions: At baseline, the presence of shallow periodontal pockets at interdental locations with a lower abundance of P. gingivalis is predictive of a favorable response to NSPT at the site level. Decreased salivary MMP-9 associated with increased GST and Annexin-1 levels can predict successful whole-mouth outcomes following NSPT.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreMoment invariants have wide applications in image recognition since they were proposed.
This article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.
These years Qatar has emerged as an important regional destination of foreign direct investment (FDI), which demonstrates the recent success of several smaller economies in attracting FDI. This paper aims to investigate the causal relationships between inward FDI and economic growth in the particular case of Qatar featured as oil production country. Vector Autoregressive (VAR) Impulse Responses and Granger Causality Tests were adopted as major research methods. Annual data set was used covering from 1990 to 2010. The main results demonstrated the bi-directional causality and long-run relationships between FDI inflows and economic growth in Qatar. And to attract FDI inflows into Qatar, the government shall continue its efforts in const
... Show MoreA solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.
The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThis research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreLet R be a commutative ring with identity and E be a unitary left R – module .We introduce and study the concept Weak Pseudo – 2 – Absorbing submodules as generalization of weakle – 2 – Absorbing submodules , where a proper submodule A of an R – module E is called Weak Pseudo – 2 – Absorbing if 0 ≠rsx A for r, s R , x E , implies that rx A + soc ( E ) or sx A + soc (E) or rs [ A + soc ( E ) E ]. Many basic properties, char
... Show MoreBackground: Osteoarthritis (OA) is a degenerative joint disease. It is one of the major causes of disability in developed and developing countries. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Objectives: To investigate whether there is an association between HLA class II-DRB and OA.Methods: A case control study with 26 patients with osteoarthritis and 22 apparently healthy obese control persons matching in ethnicity were enrolled in this study during the period between October 2012 till March 2013. Direct interview was done with each patient and HLA typing was done by molecular method using Sequence Specific Primer (PCR-SSP) method using One Lambda Kit-USA. Results: The results showed that fem
... Show More