Background: Periodontal diseases are inflammatory diseases affecting the supporting tissues of the teeth. One of the leading environmental factors that are closely related not only to the risk but also to the prognosis of periodontitis is smoking. This study aimed to evaluate the influence of smoking on periodontal health status and to measure the levels of matrix metalloproteinase-9 in smokers and nonsmokers chronic periodontitis patients, also it aimed to test the correlation between the levels of matrix metalloproteinase-9 and the clinical periodontal parameters. Materials and Methods: Five milliliters samples of un-stimulated whole saliva and full-mouth clinical periodontal recordings (plaque index, gingival index, bleeding on probing, probing pocket depth and clinical attachment level) were obtained from forty patients of two groups (non smokers with chronic periodontitis and smokers with chronic periodontitis). All subjects were systemically healthy males, with age range (35-50) years. Salivary matrix metalloproteinase-9 levels were analyzed by using Enzyme-linked Immunosorbent Assays. Results: Statistical analysis revealed that probing pocket depth and clinical attachment level were higher in smokers than non smokers, while there were decreases in the numbers of bleeding sites in smoker when compared with non smoker subjects. Salivary matrix metalloproteinase-9 levels were significantly higher in smoker with chronic periodontitis patients than their non smoker counterparts. Conclusion: Salivary matrix metalloproteinase-9, as a biomarker, could reflect the increased periodontal tissue destruction due to the smoking.
The banking system considered as one of the most important intermediate circle between creditor and debtors it is mean the most important funding rings in economic activity, whether finance takes the a consumer or investment form and therefore it is the main base to stimulate economic activity both on the demand side, both consumption and investment and therefore of the main motivating factors for economic growth.
The banking system depends in achieve its goals on the grants and loan recovery, or what is known credit process and according to what the importance referred to the role of the banking system, it is important to ensure the safety and efficiency of the mechanisms of banking device and safety is
... Show MoreThis paper deals with numerical study of the flow of stable and fluid Allamstqr Aniotina in an area surrounded by a right-angled triangle has touched particularly valuable secondary flow cross section resulting from the pressure gradient In the first case was analyzed stable flow where he found that the equations of motion that describe the movement of the fluid
In this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both
... Show MoreThe term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n
... Show MoreThe class of quasi semi -convex functions and pseudo semi -convex functions are presented in this paper by combining the class of -convex functions with the class of quasi semi -convex functions and pseudo semi -convex functions, respectively. Various non-trivial examples are introduced to illustrate the new functions and show their relationships with -convex functions recently introduced in the literature. Different general properties and characteristics of this class of functions are established. In addition, some optimality properties of generalized non-linear optimization problems are discussed. In this generalized optimization problems, we used, as the objective function, quasi semi -convex (respectively, strictly quasi semi -convex
... Show MoreThe research has deal with the relationship between organizational justice and empowerment and their impact on the achievement of organizational commitment in the office of Labour and Vocational Training. To study the research problem which is represented a sense that employees with low levels of organizational justice and empowerment and the reflection on the organizational commitment of the employees, so that Has been collecting data and information relating to research by designing a questionnaire, were distributed to a sample of (50) people in the office mentioned, and the results of the study to confirm the research hypotheses. and the key results of the research was the presence of correlation relationships and the effect o
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More