The oral cavity has the second major and most diverse microflora after the gut. Since it is the starting point of digestion; the oral microbiota is essential for maintaining oral and systemic health. Thus, this study aimed to find the bacterial isolates which act as a causative agent of periodontal diseases in Iraqi patients and their relation with some immune oral parameters. Saliva specimens and oral swabs of 91 patients (51) and control individuals (40) were collected in this study. The specimens of patients were collected from Al-Amirya and Almaamon Specialized Dental Centers in Baghdad for a period from November/2021 to February/2022. The microbiological results revealed, that the most prevalent bacterial isolates were related to the genus, which was descending graduated into Staphylococcus spp.74.5%> Enterobacteriaceae spp.62.7% > Streptococcus spp. 13.7% and Acinetobacter spp.13.7% > Neisseria spp.9.8% > Bacillus spp.5.8% > Corynebacterium spp. 3.9% and Pseudomonas spp.3.9%, and in the same context, the acidic pH of the patient's or control's mouths is more conducive for bacterial development than other pH items. As well by using the ELISA technique, the soluble form of TLR2 7.384 ± 4.031 ng/ml elucidated a significant increase in patients than the control group 5.313 ± 3.106 ng/ml, while interleukin 6 shows a strange increase in both patients and the control group saliva 50161 ± 63869, 52087 ± 62756 ng/ l respectively.
Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreRoald Dhal's is a prominent British short story writer who presented a fictional world full of contradictions and ironies. It is also full of double meanings where things are not what they appear to be and where meaninglessness is a prominent component. Dahl's world is also colored with blackness and grotesqueness; full of comedy that makes you shiver instead of laugh and characters who invite a sneak peek into a different side, a dark side of human nature. Dahl's themes are various and gripping but usually revolve around the triangle that frames his fiction: violence, humour, and absurdity. What seems to be a prominent and recurrent theme that intersects with every element in this triangle is revenge. In one story after another Dahl pre
... Show MoreA vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Atotal of 551 water samples drinking( five Water Treatment Plans (WTPs) and raw water( from different sites on Tigris river) were collected.According to morphological characteristics and a set of biochemical tests, one hundred twenty eight of Aeromonas spp isolates were obtained In this study The percentages of Aeromonas recovery from river water was 72.52%, from wells water was (35%).Total percentage of positive aeromonas samples of treated water(Filtration &chlorine tank, supply water of WTPs, distribution system, reserviores and other samples not related to WPTs) was 8.8%.Count of Aeromonas in positive aeromonas samples ranging from 1 to 175 cfu 100 ml.
The results showed that generally no significant correlation between presen
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More
Research Summary
The doctrine of belief in the Last Day is one of the pillars of faith, and the doctrine of resurrection and reckoning are part of this day.
Belief in the Last Day puts a person in constant control over himself, as this control creates in this person happiness and a decent life, and he renounces the world and turns away from all vices and adorns all virtues.
On the other hand, we find that the person who does not believe in this day does not stand before his eyes anything that prevents him from doing injustices and corruption in the land. The doctrine of belief in the Last Day alone is
... Show MoreB3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show More