Background: The cells of periodontium contain many intracellular enzymes like (alkaline phosphatase ALP) that are released outside into the saliva and gingival crevicular fluid (GCF) after destruction of periodontal tissue. The aim of study was to determine the activity of this enzyme in saliva and its relation to the salivary flow rate, PH and clinical periodontal parameters in patients with chronic periodontitis. Subject, Materials and methods: Sample population consist of 75 individuals ;divided into four groups , the first group (15):control subject, the second group (20):mild chronic periodontitis, the third group(20) moderate chronic periodontitis and the fourth group (20) sever chronic periodontitis, Measurements of plaque index (PLI), gingival index (GI), bleeding on probing (BOP), probing pocket depth (PPD) and clinical attachment level (CAL), only male were included and saliva was collected from them and subjected to biochemical analysis of the alkaline phosphatase enzyme (ALP), and also measurement of salivary flow rate(FR) and PH. Results: Statistical analysis of the results revealed the presence of a highly significant difference in the enzymatic activity between healthy and chronic periodontitis subjects (mild, moderate, severe) with positive correlation between the activity of this enzyme and the clinical periodontal parameters, and negative correlation between this enzyme and Salivary flow rate and pH. Conclusion: From this study it can be concluded that a number of markers show promise as sensitive measures of disease and the effectiveness of therapy. At this time enzymes such as alkaline phosphatase ALP, is good biochemical markers of screening chronic periodontitis. Also ALP can be used as a monitor for healthy individuals and patients with different periodontal diseases. Furthermore, analysis of saliva may offer a cost effective approach to assessment in controlling progression of chronic periodontitis in large populations.
The cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
This work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show MoreThe concept of fully pseudo stable Banach Algebra-module (Banach A-module) which is the generalization of fully stable Banach A-module has been introduced. In this paper we study some properties of fully stable Banach A-module and another characterization of fully pseudo stable Banach A-module has been given.
Medical imaging is a technique that has been used for diagnosis and treatment of a large number of diseases. Therefore it has become necessary to conduct a good image processing to extract the finest desired result and information. In this study, genetic algorithm (GA)-based clustering technique (K-means and Fuzzy C Means (FCM)) were used to segment thyroid Computed Tomography (CT) images to an extraction thyroid tumor. Traditional GA, K-means and FCM algorithms were applied separately on the original images and on the enhanced image with Anisotropic Diffusion Filter (ADF). The resulting cluster centers from K-means and FCM were used as the initial population in GA for the implementation of GAK-Mean and GAFCM. Jaccard index was used to s
... Show MoreIn this paper, mixed spinel Co0.4Zn0.6Fe2O4 ferrite was synthesized by microwave-assisted combustion method. Photocatalytic activity of the as-synthesized sample was investigated against methylene blue dye at room temperature at different exposure times (60-360 min.) under visible light. Phase impurity and surface morphology which are investigated with XRD analysis and field emission- scanning electron microscopy, indicate that a cubic spinel unit cell structure with a crystilite size and lattice constant are 22.5048nm and 8.37Å, respectively. The saturation magnetization exhibited directly from the hysteresis loop is (70.20emu/g). Optical properties for the investigated ferrite
... Show MorePing message focused on highlighting the fact commodity trading in Iraq, and increased exposure to world merchandise trade imbalance, which dominate Iraq's foreign trade major commodity is oil, and therefore the inability of Iraq to control financial revenue as a result of the fluctuations in the international market, the shortage of commodity products will lead inevitably to the weakness in the ability of the local market to meet the internal demand and due to the lack of flexible production machine For agricultural, industrial and economic sectors are responding to changes in the domestic or external demand which will open the door to merchandise imports to invade these markets, since the adoption of the Iraq oil exports,
... Show MoreThis study aimed to find out the impact of work-life balance on employee satisfaction in five-star hotels in Amman, Jordan based on a descriptive analytical approach. The questionnaire of the survey was designed and distributed to a sample of participants in order to collect the necessary data for this study and they were analyzed later through the SPSS V22 program. The study population was the hotel sector in Jordan, while the study sample included the five-star hotels in the capital, Amman, and the sampling unit included the employees of the middle and lower levels of management in the five-star hotels in Amman. The study showed a number of results, including the existence of a good level of work-life balance by employees in top manage-me
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More