The oral cavity has the second major and most diverse microflora after the gut. Since it is the starting point of digestion; the oral microbiota is essential for maintaining oral and systemic health. Thus, this study aimed to find the bacterial isolates which act as a causative agent of periodontal diseases in Iraqi patients and their relation with some immune oral parameters. Saliva specimens and oral swabs of 91 patients (51) and control individuals (40) were collected in this study. The specimens of patients were collected from Al-Amirya and Almaamon Specialized Dental Centers in Baghdad for a period from November/2021 to February/2022. The microbiological results revealed, that the most prevalent bacterial isolates were related to the genus, which was descending graduated into Staphylococcus spp.74.5%> Enterobacteriaceae spp.62.7% > Streptococcus spp. 13.7% and Acinetobacter spp.13.7% > Neisseria spp.9.8% > Bacillus spp.5.8% > Corynebacterium spp. 3.9% and Pseudomonas spp.3.9%, and in the same context, the acidic pH of the patient's or control's mouths is more conducive for bacterial development than other pH items. As well by using the ELISA technique, the soluble form of TLR2 7.384 ± 4.031 ng/ml elucidated a significant increase in patients than the control group 5.313 ± 3.106 ng/ml, while interleukin 6 shows a strange increase in both patients and the control group saliva 50161 ± 63869, 52087 ± 62756 ng/ l respectively.
In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data sets
Contemporary life is racing against time in its temptations and variables, and it has become shaped and changed in an amazing way in its various aspects and fields. This was facilitated by intellectual and scientific communication between civilizations, and the rapid progression in successive inventions and discoveries in the fields of science and arts of knowledge. This contributed to a great economic and commercial renaissance. Then, these economic developments entered the world into a very strong competition, which forced producers to calculate all production costs, to reach the highest profits by reducing the price of the produced commodity on the one hand, and achieving quality in appearance (especially) on the other hand. Since the ma
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreA numerical method for the calculation of the three-dimensional wake rollup behind symmetric wings with ground effect and its aerodynamic characteristics for steady low subsonic flow have been developed. A non-planar quadrilateral vortex-ring method with vortex wake relaxation iterative scheme for lifting surfaces is obtained. A computer program was build to treat wings with breaks, span wise trailing edge flaps, local dihedral angle, camber, twist and ground effect. Forces and moments are obtained from vector product of local velocity and vortex strength multiplied by density. The program has been validated for a number of configurations for which experimental data is available. Good agreement has been obtained for these configurations. Al
... Show MoreLet R be an associative ring with identity and M be unital non zero R-module. A
submodule N of a module M is called a δ-small submodule of M (briefly N << M )if
N+X=M for any proper submodule X of M with M/X singular, we have
X=M .
In this work,we study the modules which satisfies the ascending chain condition
(a. c. c.) and descending chain condition (d. c. c.) on this kind of submodules .Then
we generalize this conditions into the rings , in the last section we get same results
on δ- supplement submodules and we discuss some of these results on this types of
submodules.
In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.
The purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m
... Show MoreMany neuroscience applications, including understanding the evolution of the brain, rely on neural cell instance segmentation, which seeks to integrate the identification and segmentation of neuronal cells in microscopic imagery. However, the task is complicated by cell adhesion, deformation, vague cell outlines, low-contrast cell protrusion structures, and background imperfections. On the other hand, existing segmentation approaches frequently produce inaccurate findings. As a result, an effective strategy for using the residual network with attention to segment cells is suggested in this paper. The segmentation mask of neural cells may be accurately predicted. This method is built on U-net, with EfficientNet serving as the e
... Show MoreMany fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.
In today's world, digital image storage and transmission play an essential role,where images are mainly involved in data transfer. Digital images usually take large storage space and bandwidth for transmission, so image compression is important in data communication. This paper discusses a unique and novel lossy image compression approach. Exactly 50% of image pixels are encoded, and other 50% pixels are excluded. The method uses a block approach. Pixels of the block are transformed with a novel transform. Pixel nibbles are mapped as a single bit in a transform table generating more zeros, which helps achieve compression. Later, inverse transform is applied in reconstruction, and a single bit value from the table is rem
... Show More