Background: Investigating dental health knowledge among children is important. Knowing what behaviors are right in relation to dental health does not guarantee that children will practice those behaviors. However, lack of knowledge and misconceptions about dental health may lead to behaviors that are harmful to teeth and gum. Baseline data on knowledge levels are required to determine which particular areas of dental health education are in need of improvement for high-risk children living in different geographical areas. This research was conducted to study the oral health status, dental knowledge and behavior in relation to two different cities, among children in Baghdad and Thamar (republic of Yemen) governorate. Materials and Methods: The sample collected was composed of two geographically different groups, first group from Baghdad city: composed of 144 children and adolescents and the second group collected from the city of Thamar (republic of Yemen) composed of 108 of an age range 8-15 years old children. Dental plaque and Gingival health condition was assessed by using plaque index of Silness and Loe (1964),and gingival index of Loe and Silness (1963), Ramfjord index teeth were examined to represent the whole dentition. Oral examination was performed by a single examiner using mouth mirror and dental explorer for each child. Ten questions were fabricated to evaluate the dental health knowledge and behavior of the two groups. Results: This study was recorded that the age group 12-15 years old the significant difference was found in relation to gingival health condition, the dental Knowledge and behaviors was the highly significant difference was found between Baghdad and Thamar group. As well as highly scores of dental knowledge and behavior was significantly related to the dental plaque for both Baghdad and Thamar group. Conclusion: The difference in the geographical location could affect on oral hygiene, dental health knowledge and behavior of the children and adolescent.
One of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.
A field experiment was conducted at two sites (Baghdad and Wasit Governorates) to evaluate the effects of allelopathic corn residues applied as soil incorporation or mulch, alone and in combination with reduced (50% of recommended dose) rate of trifluralin herbicide on weeds growth and mung bean yield. Conventional soil tillage and zero soil tillage treatments with corn residues were performed, while 50% dose and full dose of trifluralin only (without residues) treatments were included for comparison. Soil incorporation and mulch of corn residues reduced weed density and dry weight biomass and improved yield and yield components of mung bean in both sites. Mulch application was more effective than soil incorporation for we
... Show MorePlasma alkaline phosphatase isozyme in Iraqi fowl was studied by acrylamide gel electrophoresis. Two phenotypes fast and slow, were observed. These two phenotypes have been shown to be controlled by one single autosomal locus with two allel AKPF and AKPS. The gene frequency of AKPS is dominant over the AKPF. The result indicated that gene frequency of AKPF in leghorn and new hamshire was more frequent than in local Iraqi birds. Birds of fast isozyme type had higher 90 – day's egg production and egg weights as compared to those with slow isozyme. It is concluded that the fast isozyme can be used as gene marker for spotting out pullets with high body weight sexual maturity, high egg production and high egg weight.
The following study was conducted to investigate the correlation between the expression of three different genes (NOB1, DDX47, CD101( with the occurrence and development of chronic myeloid leukemia (CML) in Iraq. The difference in the expression of these genes between patients and healthy controls was studied. Moreover the correlation of age and gender with CML occurrence and comparing with control was also examined. Results showed significant increases in mean of gene expression level (ΔCt) of patient groups for all genes compared to the corresponding ΔCt means in control group, also the gene expression folding (2-ΔΔCt) reflect significant differences in the expression of these genes and CD101, mRNA showed the highest level in CML pati
... Show MoreBackground: Myocardial infarction (MI) is distinguished by the necrosis of myocardial cells as a result of substantial and prolonged ischemia. Anxiety, problems sleeping, and feelings of depression are some of the most common psychosocial consequences of having a myocardial infarction. Aim: The purpose of this study is to evaluate the effects of post-myocardial infarction on patients' levels of anxiety, depression, and quality of sleep. Method: The collection of data from 94 individuals with MI was carried out according to a descriptive cross-sectional design. Sleep quality, depression, and anxiety were evaluated using standard questionnaires. Results: 69.1% of the participants reported having trouble getting quality sleep. The perc
... Show MoreThe study was carried out to detection of H. pylori in (218) patients who attended two teaching hospitals in Baghdad. The diagnosis was done by Immunochromatography methods. Stools and blood samples were taken from each patient as well as other (30) healthy control matching in age. The study included measurement the Levels of Interleukin-32, Interleukin-33, and Acid phosphatase in sera of patients and control .The result indicated presence of H pylori antigen in 115 cases 59 cases of males and 51 of females , Also, the result indicated increasing levels of IL-32 and IL-33 and Acid phosphatase in patients sera in comparison with healthy control.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreB3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.