KE Sharquie, AA Noaimi, HA Salman, NA Hindy, Iraqi Postgraduate Medical Journal, 2009 - Cited by 1
Background: A diverse group of bacteria live in biofilms in the oral cavity. On dental surfaces biofilms form plaque that is potentially involved in caries and periodontal diseases. Periodic studying of plaque microflora and their antimicrobial sensitivity patterns strongly affects the clinical practice in plaque-induced oral diseases. Materials and methods: Dental plaque samples were collected from 22 patients having ages ranged between 33 and 49 years with gingivitis that met the study criteria. Plaque, gingival and gingival bleeding indices (PI, GI, GBI) were measured for each patient. Laboratory procedures included microbiological examination of plaque samples followed by antibiotic sensitivity testing using disc diffusion method were
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Humanoids or bipedal robots are other kinds of robots that have legs. The balance of humanoids is the general problem in these types when the other in the support phase and the leg in the swing phase. In this work, the walking pattern generation is studied by MATLAB for two types of degrees of freedom, 10 and 17 degrees of freedom. Besides, the KHR-2HV simulation model is used to simulate the experimental results by Webots. Similarly, Arduino and LOBOT LSC microcontrollers are used to program the bipedal robot. After the several methods for programming the bipedal robot by Arduino microcontroller, LOBOT LSC-32 driver model is the better than PCA 96685 Driver-16 channel servo driver for programming the bipedal walking rob
... Show MoreObjective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instrument
Background: Antibiotics are among the most commonly used medicine, in both community and hospital setting, all over the world especially in countries where no strict guideline to regulate their use. In Iraq, only a few studies conducted to describe the antibiotic prescription pattern in general hospitalsand even less in pediatric hospital.
Objective: To describe the patterns for antibiotics used in Elwia pediatric teaching hospital in Baghdad, Iraq
Type of the study: Descriptive cross sectional study.
.Methodology: The study was conducted at AL-Elwia Pediatric Teaching Hospitalduring the year 2016. A random sample from all the prescriptions sheets
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show More