The oral cavity has the second major and most diverse microflora after the gut. Since it is the starting point of digestion; the oral microbiota is essential for maintaining oral and systemic health. Thus, this study aimed to find the bacterial isolates which act as a causative agent of periodontal diseases in Iraqi patients and their relation with some immune oral parameters. Saliva specimens and oral swabs of 91 patients (51) and control individuals (40) were collected in this study. The specimens of patients were collected from Al-Amirya and Almaamon Specialized Dental Centers in Baghdad for a period from November/2021 to February/2022. The microbiological results revealed, that the most prevalent bacterial isolates were related to the genus, which was descending graduated into Staphylococcus spp.74.5%> Enterobacteriaceae spp.62.7% > Streptococcus spp. 13.7% and Acinetobacter spp.13.7% > Neisseria spp.9.8% > Bacillus spp.5.8% > Corynebacterium spp. 3.9% and Pseudomonas spp.3.9%, and in the same context, the acidic pH of the patient's or control's mouths is more conducive for bacterial development than other pH items. As well by using the ELISA technique, the soluble form of TLR2 7.384 ± 4.031 ng/ml elucidated a significant increase in patients than the control group 5.313 ± 3.106 ng/ml, while interleukin 6 shows a strange increase in both patients and the control group saliva 50161 ± 63869, 52087 ± 62756 ng/ l respectively.
The main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and
Physiological status and litter size can indeed have a significant impact on ewes' hematological parameters, which are essential indicators of their health. Therefore, this study examined the hematological profiles of ewes during pregnancy with single and twins in the Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests were conducted on the sheep's blood samples promptly following collection. The findings demonstrated variations in hematological parameters among pregnant
... Show MoreThe concept of separation axioms constitutes a key role in general topology and all generalized forms of topologies. The present authors continued the study of gpα-closed sets by utilizing this concept, new separation axioms, namely gpα-regular and gpα-normal spaces are studied and established their characterizations. Also, new spaces namely gpα-Tk for k = 0, 1, 2 are studied.
Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
Acute myeloid leukemia represents the most prevalent type of acute leukemia in adults. Mutations in the tumor protein (TP53) gene have been found in more than half of all human cancers. This study was done to investigate the relationship between TP53 gene expression and the appearance and progression of acute myeloid leukemia in Iraq. This study included 100 subjects, divided into 60 patients suffering from pre-diagnostic acute myeloid leukemia and 40 healthy individuals. The difference in TP53 gene expression between acute myeloid leukemia patients and healthy individuals has been investigated, and the gene expression of TP53 has been measured after extraction of total RNA at concentrations (15–83 n
... Show MoreThe main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and
Visceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More