Background: Tooth wear is one of the most concerning problems of the current dental practice especially among older subjects. The aim of this study is to determine the severity of tooth wear and its relation with selected salivary variables (salivary pH and vitamin C level) among a group of older adults in Mosul city/Iraq. Materials and methods: All subjects (30 subjects) of both gender tookpart in the current study; sixteen of them were older adults (55-65 years) and compared with fourteen middle-aged adults (30-40 years) at Textile factory in Mosul city/Iraq. Unstimulated salivary samples were collected and salivary pH was immediately measured. Salivary vitamin C level was determined colormetrically. Severity of tooth wear was determined according to Hansson and Nilner (1975) classification. Results: Results showed that all severity scores of tooth wear revealed higher percentage among older adults than middle-aged adults. Also all tooth segment types revealed higher percentage of tooth wear among older adults than middle-aged adults. Moreover regarding the highest score of tooth wear by subjects, higher percentage of tooth wear was found among older adults than middle-aged adults. Concerning the total sample results disclosed that wear of enamel only revealed higher percentage than one or more teeth worn into dentine and one or more teeth worn up to 1/3 of the crown. Also in the total sample the incisor region showed higher percentage of tooth wear while the least tooth wear percentage was found in the molar region. In both age groups no significant correlations were found between salivary pH and vitamin C with the highest score of tooth wear. Conclusion: Tooth wear is more severe among older subjects. Further study is needed with larger sample size and more precise index that measure the etiology of tooth wear.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreIn petroleum reservoir engineering, history matching refers to the calibration process in which a reservoir simulation model is validated through matching simulation outputs with the measurement of observed data. A traditional history matching technique is performed manually by engineering in which the most uncertain observed parameters are changed until a satisfactory match is obtained between the generated model and historical information. This study focuses on step by step and trial and error history matching of the Mishrif reservoir to constrain the appropriate simulated model. Up to 1 January 2021, Buzurgan Oilfield, which has eighty-five producers and sixteen injectors and has been under production for 45 years when it started
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreThe construction project is a very complicated work by its nature and requires specialized knowledge to lead it to success. The construction project is complicated socially, technically and economically in its planning, management and implementation aspects due to the fact that it has many variables and multiple stakeholders in addition to being affected by the surrounding environment. Successful projects depend on three fundamental points which are cost-time, performance and specifications. The project stakeholder's objective to achieve best specifications and the cost-time frame stipulated in the contract.
The question is, was the optimum implementation accomplished? The provision for the success of the project
... Show MoreThe topic of urban transformations has attracted the attention of researchers as it is one of the basic issues through which cities can be transformed towards sustainability. A specific level of transformation levels according to a philosophical concept known as a crossing. This article has relied on a specific methodology that aims to find a new approach for urban transformation based on the crossing concept. This concept derives from philosophical entrances based on the concepts of (being, process, becoming, and integration). Four levels have been for the crossing are (normal, ascending, leap, and descending). Each of these levels includes specific characteristics that distinguish it. The results showed that there is no descending
... Show MoreIn this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these
... Show More