Background: Type 2 diabetes mellitusand chronic periodontitis hold a close relationship that has been the focus of many researches. Currently there is an appreciation to the role of adipose tissue-derived substances "the adipokines" in immune-inflammatory responses; also, there is an interest in using the simple non-invasive saliva in diagnosing and linking oral and general health problems. The current study aims to determine the periodontal health status in the chronic periodontitis patients with and without poorly or well controlled type 2 diabetes mellitus, measure the salivary levels of two adipokines "leptin and resistin", pH and flow rate and then correlate between these clinical periodontal, biochemical and physical parameters in eac
... Show MoreThe aerodynamic and elastic forces may cause an oscillation of the structure such as the high frequency of the airfoil surfaces and the dynamic instability occurring in an aircraft in flight and failure may occur at a speed called flutter speed. In this work, analytical and numerical investigations of flutter limits of thin plates have been carried out. The flutter speed of rectangular plates were obtained and compared with some published results. Different design parameters were investigated such as aspect ratio, thickness and their effects on flutter velocity. It was found that the structural mode shape plays an important role in the determination of the flutter speed and the coupling between the bending and torsional mode is the main
... Show MoreAbstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreThe inhibition of 3-Benzyl -2-mercaptoquinoizoline -4 (3H)-one (BMQ) on the corrosion of carbon steel in 0.5 M HCl studied by potentionstat polarization methods at 303–333 K. Results obtained show that BMQ act as inhibitor for carbon steel in HCl solution. The inhibition efficiency increase with increase in BMQ concentration. Activation parameters and Gibbs free energy for the adsorption process using Statistical Physics calculated and discussed. Quantum chemical calculations using DFT at the B3LYP/6-31G level of theory were used to calculate some electronic properties of the molecule to verify any correlation between the inhibitive effect and molecular structure of BMQ. The quantum calculations were proceeded to get data around correlati
... Show MoreAt the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More