Orthodontic tooth movement is characterized by tissue reactions, which consist of an inflammatory response in periodontal ligament and followed by bone remodeling in the periodontium depending on the forces applied. These processes trigger the secretion of various proteins and enzymes into the saliva. The purpose of this study was to evaluate the activity of the lactate dehydrogenase (LDH) in saliva during orthodontic tooth movement using different magnitude of continuous orthodontic forces. Thirty orthodontic patients (12 males and 18 females) with ages 17-23 years with class II division I malocclusion all requiring bilateral maxillary first premolar extractions. Those patients were randomly divided into 3 groups according to the magnitude of the force application (40, 60 and 80gm). A sectional fixed appliance was bonded and designed to give labial force to the maxillary first premolar for 3 weeks. Unstimulated saliva was collected from the patients before force application, then 1 hour after force application, followed by 1, 7, 14 and 21 days. Salivary levels of LDH were measured using spectrophotometer and compared with the baseline level. The results revealed that LDH enzyme level increased with increasing magnitude of orthodontic force (from 40 to 80gm). This was statistically significant after 1 hour, 1, 7, 14 and 21 days of force application. The LDH significantly increased from baseline after 1 hour and peaked at 21 days for all the 3 force levels. The LDH level reflect the biological activity that takes place in the periodontium during orthodontic tooth movement, and therefore it can be used as a diagnostic tool for monitoring of correct orthodontic tooth movement in clinical practice.
Abstract
The study aims to clarify the impact of the adoption of the International Financial Reporting Standard (IFRS16) on lease contracts in the General Iraqi Insurance Company on the financial statements, and thus the impact on financial ratios and indicators, Since the financial reporting standard considers lease contracts as an asset called the right to use the asset and is offset by a liability, this changes the way the financial statements are presented, with an addition to both the asset and liability sides. In order to show the extent to which the adoption of the standard reflects on the financial performance
... Show MoreThe importance of government Expenditure policy in economy come from its role leading to the mitigation and adjustment of fluctuations in macroeconomic variables caused by imbalance between aggregate demand and aggregate supply, It is associated with the efficient management of government Expenditure to reinforcement the relationship between government Expenditure and the overall economic system .
Regarding the Iraqi economy,the increasing in financial rentier after the political change in 2003 has led to finance the budgets Characterized by consumption,The government Expenditure employed to encourage government employment in services jobs, and find different channels for the distribution of
... Show MoreBackground: Non-nutritive sucking habit (NNSH) is the main environmental causative factor that disturbs normal orofacial development. In spite of the harmful effect of pacifier as a NNSH, mothers aware from the other types of NNSH like thumb sucking far more than pacifier use. Open bite is one of the most challenging malocclusions in orthodontics due to the high prevalence of relapse after treatment, so preventing the causative factor of its occurrence is essential at early age of child life. This study aims to assess the impact of two non-nutritive patterns on the development of anterior open bite in primary dentition and to compare which of these habits mostly affect open bite development. Materials and Methods: The sample consisted of
... Show MoreThe research aimed to find the effectiveness of teaching impact of the reflex learning strategy on the fifth class female student achievement of the geography content material). The researcher adopted the null hypotheses (there are no statistically significant differences at (0,05) level between the women score mean of the experimental group student who has been taught by the cement material assigned by the reflex learning strategy, and that of the control group who have been taught by the traditional method on the achievement test. The researcher adopted the post-test experimental design to measure students’ achievement. The population of the present study has been limited to the fifth literary class female stud
... Show MoreDie Zusammenfassung :
In der Forschung „ Die Wirkungen der Nachkriegliteratur „ findet man einen Überblick über die Wirkungen der Literatur im Allgemeinen und besonders über die Wirkungen der Nachkriegliteratur in Deutschland. Das Kurzgeschichte „ das Brot“ von Wolfgang Borchert „ wird in dieser Forschung als Beispiel analysiuert, weil sie die Nachteile des Kriegs und ihre Wirkungen auf die Familienbeziehungen behandelt. Die Hauptfiguren der Kurzgeschichte sind ein alter Mann und seine Frau. Der Schriftsteller bestimmt die Rolle der Frauen in Deutschland. Die Frau in dieser Geschichte ist stärker als ihren Mann , denn er war lügner und schwach.
Post-war Literature has an e
... Show MoreThis study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More