Preferred Language
Articles
/
jbcd-216
Oral health status, salivary physical properties and salivary Mutans Streptococci among a group of mouth breathing patients in comparison to nose breathing
...Show More Authors

Background: Mouth breathing can lead to introduce cold, dry unprepared air that insults the tissue of oral cavity, nasopharynx and lung, leading in turn to pathological changes in oronasal cavity, nasopharyngeal and other respiratory tissue, mouth breathing associated with nasal obstruction may lead to many health problems, in particular oral health problems such as inflammation of gingiva, oral dryness, change in oral environment that may decrease pH, salivary flow rate and increase bacteria and dental caries.Aims of the present study were to assess the oral health condition among mouth breather associated with nasal obstruction, including dental caries, oral cleanliness and gingival health condition as well as to evaluate the changes in salivary physical characteristics and salivary mutans streptococci counts, and their relation to oral variables in comparison to a control group. Materials and Methods: Thirty patients with mouth breathing associated with nasal obstruction (15 females and 15 males) were selected as a study group with an age range (18-22) years old, all subjects were examined by ENT specialist to confirm mouth breathing. A 30 gender and age matched healthy looking subjects without nasal obstruction were selected as control. The diagnosis and recording of dental caries was according to severity of dental caries lesion through the application of D1_4MFS(Manji et al., 1989). Plaque index of (Silness and Loe, 1964) was used for plaque assessment; gingival index of (Loe and Silness, 1963) was used for gingival health condition assessment. Stimulated salivary samples were collected according to (Tenovuo and Lagerlof, 1996) and the following variables were recorded: microbiological analysis included the salivary counts of mutans streptococci, salivary flow rate, salivary pH (potential of hydrogen) and then measurement of salivary viscosity by using Ostwald's viscometer. Results: Results of the present study showed that the mouth breathing group had statistically highly significant, higher plaque and gingival indices than nose breathing group (P<0.01) with a positive highly significant correlation between them in mouth breathing and nose breathing groups (r=0.56, r= 0.64, respectively).The salivary flow rate was lower among mouth breathing with highly significant difference than nose breathing (P<0.01), also salivary pH was lower among mouth breathing but with significant differencecompare to nose breathing (P<0.05); statistically a negative highly significant correlation was recorded among mouth breathing group between salivary flow rate with gingival index (r= -0.56). It has been found that salivary viscosity was not statistically significant difference between mouth breathing group and nose breathing group. The salivary viscosity was found to be inversely significantly correlated with salivary flow rate among mouth breathing group (r= -0.38). While it was positively not significantly correlated with plaque index, gingival index and counts of mutans streptococci among mouth breathing group. Data analysis of the present study showed that salivary mutans streptococci counts among mouth breathing group were higher than that among nose breathing group, difference was statistically highly significant (P<0.01). Conclusion: Mouth breathing associated with nasal obstruction may have an effect on oral health status, leading to an increase in periodontal disease and changes in dental caries.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
A Brief view on the pediatric COVID- 19 pandemic
...Show More Authors

The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Aluminum Rubbish as a Coagulant for Oily Wastewater Treatment
...Show More Authors

In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (17)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Revista De Gestão Social E Ambiental
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
2008 15th Asia-pacific Software Engineering Conference
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

View Publication
Scopus (16)
Crossref (30)
Scopus Clarivate Crossref