The oral cavity has the second major and most diverse microflora after the gut. Since it is the starting point of digestion; the oral microbiota is essential for maintaining oral and systemic health. Thus, this study aimed to find the bacterial isolates which act as a causative agent of periodontal diseases in Iraqi patients and their relation with some immune oral parameters. Saliva specimens and oral swabs of 91 patients (51) and control individuals (40) were collected in this study. The specimens of patients were collected from Al-Amirya and Almaamon Specialized Dental Centers in Baghdad for a period from November/2021 to February/2022. The microbiological results revealed, that the most prevalent bacterial isolates were related to the genus, which was descending graduated into Staphylococcus spp.74.5%> Enterobacteriaceae spp.62.7% > Streptococcus spp. 13.7% and Acinetobacter spp.13.7% > Neisseria spp.9.8% > Bacillus spp.5.8% > Corynebacterium spp. 3.9% and Pseudomonas spp.3.9%, and in the same context, the acidic pH of the patient's or control's mouths is more conducive for bacterial development than other pH items. As well by using the ELISA technique, the soluble form of TLR2 7.384 ± 4.031 ng/ml elucidated a significant increase in patients than the control group 5.313 ± 3.106 ng/ml, while interleukin 6 shows a strange increase in both patients and the control group saliva 50161 ± 63869, 52087 ± 62756 ng/ l respectively.
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreUnder atmospheric pressure, an argon plasma stream was sustained and its plasma characteristics were examined. The emission spectra of plasma created in a plasma jet system using argon gas were observed for three metals (Ag, Zn, and Cu) for the anode and varied flow rates ranging from 1–4 L/min. at constant voltage, and normal atmospheric pressure. The spectral lines of excited Ar, Ag, Zn, and Cu species were identified at a wavelength of (650–900) nm .The Debye length, sphere, and temperature of an electron are all measured. Optical emission spectrometer (OES) equipment was used to capture the spectrum produced by the plasma at various argon gas flow rates.The temperature and density of the electron (Te) and (n
... Show More Reaction of Na2PdCl4 with benz-1,3-imidazole-2-thione or (bzimtH) benz-1,3-thiazoline2-thione (bztztH) in ethanol / NE3 afford complexes of the type [Pd(bzimt)2](1) and [Pd(bztzt)2](2) respectively. Treatment of [Pd(L)2] L= bzimt or bztzt with bidentate ligands (N^N) where N^N= bipyridine (Bipy) , phenanthroline (Phen) , ethylene diamine , or N,N′dimethylethylene diamine afford mononuclear complexes of the type [PdL2(N^N)]. The bzimt and bztzt ligands are coordinated as bidentate chelating ligands through the S and N in (1) and (2) whereas bonded as a monodentate fashion via the sulfur atom in other complexes. The prepared complexes were characterized by elemental CHN analysis, ir and 1H nmr spectra.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreIn this work, the calculation of matter density distributions, elastic charge form factors and size radii for halo 11Be, 19C and 11Li nuclei are calculated. Each nuclide under study are divided into two parts; one for core part and the second for halo part. The core part are studied using harmonic-oscillator radial wave functions, while the halo part are studied using the radial wave functions of Woods-Saxon potential. A very good agreement are obtained with experimental data for matter density distributions and available size radii. Besides, the quadrupole moment for 11Li are generated.
Will address this research interaction and coordination between fiscal and monetary policies and the impact of this interaction and coordination on economic stability and growth، and how the financial implications of monetary policy may stimulate action monetary policy and treatment side effects and the nature of responsiveness and bounce between procedures both two policies and their impact on the balance of overall economic and explained in the folds of searchjustifications coordination and the extent necessary in order to address the imbalances in economic activity through twinning actions of monetary and fiscal، has embodied this coordination and interaction between policies and their impact m
... Show MoreThree mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreLet be any group with identity element (e) . A subgroup intersection graph of a subset is the Graph with V ( ) = - e and two separate peaks c and d contiguous for c and d if and only if , Where is a Periodic subset of resulting from . We find some topological indicators in this paper and Multi-border (Hosoya and Schultz) of , where , is aprime number.