Background: Mouth breathing can lead to introduce cold, dry unprepared air that insults the tissue of oral cavity, nasopharynx and lung, leading in turn to pathological changes in oronasal cavity, nasopharyngeal and other respiratory tissue, mouth breathing associated with nasal obstruction may lead to many health problems, in particular oral health problems such as inflammation of gingiva, oral dryness, change in oral environment that may decrease pH, salivary flow rate and increase bacteria and dental caries.Aims of the present study were to assess the oral health condition among mouth breather associated with nasal obstruction, including dental caries, oral cleanliness and gingival health condition as well as to evaluate the changes in salivary physical characteristics and salivary mutans streptococci counts, and their relation to oral variables in comparison to a control group. Materials and Methods: Thirty patients with mouth breathing associated with nasal obstruction (15 females and 15 males) were selected as a study group with an age range (18-22) years old, all subjects were examined by ENT specialist to confirm mouth breathing. A 30 gender and age matched healthy looking subjects without nasal obstruction were selected as control. The diagnosis and recording of dental caries was according to severity of dental caries lesion through the application of D1_4MFS(Manji et al., 1989). Plaque index of (Silness and Loe, 1964) was used for plaque assessment; gingival index of (Loe and Silness, 1963) was used for gingival health condition assessment. Stimulated salivary samples were collected according to (Tenovuo and Lagerlof, 1996) and the following variables were recorded: microbiological analysis included the salivary counts of mutans streptococci, salivary flow rate, salivary pH (potential of hydrogen) and then measurement of salivary viscosity by using Ostwald's viscometer. Results: Results of the present study showed that the mouth breathing group had statistically highly significant, higher plaque and gingival indices than nose breathing group (P<0.01) with a positive highly significant correlation between them in mouth breathing and nose breathing groups (r=0.56, r= 0.64, respectively).The salivary flow rate was lower among mouth breathing with highly significant difference than nose breathing (P<0.01), also salivary pH was lower among mouth breathing but with significant differencecompare to nose breathing (P<0.05); statistically a negative highly significant correlation was recorded among mouth breathing group between salivary flow rate with gingival index (r= -0.56). It has been found that salivary viscosity was not statistically significant difference between mouth breathing group and nose breathing group. The salivary viscosity was found to be inversely significantly correlated with salivary flow rate among mouth breathing group (r= -0.38). While it was positively not significantly correlated with plaque index, gingival index and counts of mutans streptococci among mouth breathing group. Data analysis of the present study showed that salivary mutans streptococci counts among mouth breathing group were higher than that among nose breathing group, difference was statistically highly significant (P<0.01). Conclusion: Mouth breathing associated with nasal obstruction may have an effect on oral health status, leading to an increase in periodontal disease and changes in dental caries.
CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreIn this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show More