Background: Periodontal diseases are bacterial infections of the gingiva, bone and attachment fibers that support the teeth and hold them in the jaw. α-amylase is an enzyme, produced mainly by parotid gland and it seems to play a role in maintaining mucosal immunity. Aims of the study: Determine the salivary levels of α-Amylase and flow rate and their correlations with clinical periodontal parameters(Plaque Index , Gingival Index , Bleeding on Probing , Probing Pocket Depth , and Clinical Attachment Level ) and the correlation between α-Amylase with flow rate of study groups that consist of ( patients had gingivitis and patients had chronic periodontitis with different severities(mild ,moderate ,severe) and control group . Ma
... Show MoreAbstract
A series of new 4(3H)-quinazolinone derivatives (S1-S4) were synthesized and characterized by FTIR,1HNMR and 13CNMR .Their cytotoxic activity against a set of human cancer cell lines MCF-7 (breast) and A549 (lung) was evaluated using MTT assay. To detect their selectivity toward cancer cells, the compounds were also tested against epithelial cells derived from normal human fibroblast (NHF). Methotrexate (MTX) was used as a reference for comparison . All the tested compounds exhibited toxicity against the normal cells lower than cancer cells. All the tested compounds displayed higher cytotoxicity against lung cancer cell line (A549) than MTX with the most
... Show MoreFinding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.
This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show MoreBackground: Systemic sclerosis (SSc) is a chronic autoimmune illness, which is consider by three main features: Sclerotic changes in the skin and internal organs, Vasculopathy of small blood vessels, Particular autoantibodies (1). The most important autoantibodies appeared significantly in SSc patients are anti-topoisomerase I autoantibody (Scl-70), anti-centromere autoantibody (ACA), and anti-RNA polymerase III autoantibody (RNAP3) (2). Anti-centromere antibodies (ACA) are infrequent in rheumatic conditions and in healthy persons but occur commonly in limited systemic sclerosis (CREST syndrome), and rarely appeared in the diffuse form of systemic sclerosis (3). Anti-Ro/SSA and antiLa/SSB, antibodies directed against Ro/La ribonucleoprot
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBackground: The demand for esthetic orthodontic appliances is increasing; so the esthetic orthodontic archwires were introduced. Among them, Teflon and Epoxy coated stainless steel archwires. The amount of force available from the archwire depends on the structural properties and susceptibility to corrosion. All metallic alloys are changed during immersion in artificial saliva, chlorhexidine mouthwash andtoothpaste, but their behaviors differ from one type to another. They corrode at different rates, which lead to decrease the amount of force applied to the teeth. This in vitro study was designed to evaluate the corrosion pits in stainless steel archwires coated with Teflon and with Epoxy in dry and after immersion in artificial saliva, chl
... Show More