Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed by descriptive statistics and by using paired t‑test and Chi‑square test. Results: The value of Maximum mouth opening was increased with the increasing of age in both genders; however, boys had higher value of Maximum Mouth opening than that of girls. A significant difference was found between genders among 9 years old children concerning the maximum bite force. A weak positive relation was observed between Maximum mouth opening and Maximum Bite Force among the boys in both of the age groups. Conclusions: In this study, a significant positive correlation was found between Maximum bite force and Maximum Mouth opening for boys, as they had higher mean value of maximum mouth opening and maximum bite force than girls.
Swarming is one of the most important virulence factors used by bacteria to invade new sites. This study aimed to test the effects of gentamicin on swarming motility of Pseudomonas aeruginosa, both phenotypically and molecularly. The present results revealed that 11/25 isolates had gentamicin MIC of 1024 µg/ml. However, gentamicin at sub-minimal inhibitory concentration significantly (P< 0.05) reduced the diameter of swarming in all P. aeruginosa isolates. Noticeably the mean and median swarming diameter before treatment with gentamicin 5.557 and 5.816 cm respectively had significantly (P < 0.001) reduced to 0.871 and 0.766 cm respectively. At the molecular level, amrZ (a global regulator of multiple genes) and
... Show MoreMultilocus haplotype analysis of candidate variants with genome wide association studies (GWAS) data may provide evidence of association with disease, even when the individual loci themselves do not. Unfortunately, when a large number of candidate variants are investigated, identifying risk haplotypes can be very difficult. To meet the challenge, a number of approaches have been put forward in recent years. However, most of them are not directly linked to the disease-penetrances of haplotypes and thus may not be efficient. To fill this gap, we propose a mixture model-based approach for detecting risk haplotypes. Under the mixture model, haplotypes are clustered directly according to their estimated d
This study presents the effect of laser energy on burning loss of magnesium from the holes' drilled in aluminum alloy 5052. High energy free running pulsed Nd:Glass laser of 300 µs pulse duration has been used to perform the experiments. The laser energy was varied from 1.0 to 8.0 Joules, The drilling processes have been carried out under atmospheric pressure and vacuum inside a specially designed chamber. Microhardness of the blind drilled holes has been investigated .The results indicated that the magnesium loss could be manipulated by adjusting the focusing conditions of the laser beam. Almost, the obtained holes were free of cracks with low taper and low sputter deposition. .The holes performed under atmospheric conditions have high
... Show MoreIn this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the met
... Show MoreThe investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat
... Show MoreObjectives: to compare health of mothers and neonatal among age groups, to find out the correlation between
age groups and mother and neonatal health.
Methodology: A descriptive study was carried out at delivery rooms of three teaching hospitals in Baghdad city
from Feb. 28th through May. 28th
, 2013. A purposive (non-probability) sample of 300 laboring women was selected
from delivery rooms categorized into three groups, group 1 (≤19) years, group 2 their age between (20-35) years
old and group 3 their age (≥35) years. The data were collected through the use of constructing questionnaire, an
interview technique with mothers and reviewing their medical records as means of data collection; The
questionnaire con
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More