Background: Mouth breathing can lead to introduce cold, dry unprepared air that insults the tissue of oral cavity, nasopharynx and lung, leading in turn to pathological changes in oronasal cavity, nasopharyngeal and other respiratory tissue, mouth breathing associated with nasal obstruction may lead to many health problems, in particular oral health problems such as inflammation of gingiva, oral dryness, change in oral environment that may decrease pH, salivary flow rate and increase bacteria and dental caries.Aims of the present study were to assess the oral health condition among mouth breather associated with nasal obstruction, including dental caries, oral cleanliness and gingival health condition as well as to evaluate the changes in salivary physical characteristics and salivary mutans streptococci counts, and their relation to oral variables in comparison to a control group. Materials and Methods: Thirty patients with mouth breathing associated with nasal obstruction (15 females and 15 males) were selected as a study group with an age range (18-22) years old, all subjects were examined by ENT specialist to confirm mouth breathing. A 30 gender and age matched healthy looking subjects without nasal obstruction were selected as control. The diagnosis and recording of dental caries was according to severity of dental caries lesion through the application of D1_4MFS(Manji et al., 1989). Plaque index of (Silness and Loe, 1964) was used for plaque assessment; gingival index of (Loe and Silness, 1963) was used for gingival health condition assessment. Stimulated salivary samples were collected according to (Tenovuo and Lagerlof, 1996) and the following variables were recorded: microbiological analysis included the salivary counts of mutans streptococci, salivary flow rate, salivary pH (potential of hydrogen) and then measurement of salivary viscosity by using Ostwald's viscometer. Results: Results of the present study showed that the mouth breathing group had statistically highly significant, higher plaque and gingival indices than nose breathing group (P<0.01) with a positive highly significant correlation between them in mouth breathing and nose breathing groups (r=0.56, r= 0.64, respectively).The salivary flow rate was lower among mouth breathing with highly significant difference than nose breathing (P<0.01), also salivary pH was lower among mouth breathing but with significant differencecompare to nose breathing (P<0.05); statistically a negative highly significant correlation was recorded among mouth breathing group between salivary flow rate with gingival index (r= -0.56). It has been found that salivary viscosity was not statistically significant difference between mouth breathing group and nose breathing group. The salivary viscosity was found to be inversely significantly correlated with salivary flow rate among mouth breathing group (r= -0.38). While it was positively not significantly correlated with plaque index, gingival index and counts of mutans streptococci among mouth breathing group. Data analysis of the present study showed that salivary mutans streptococci counts among mouth breathing group were higher than that among nose breathing group, difference was statistically highly significant (P<0.01). Conclusion: Mouth breathing associated with nasal obstruction may have an effect on oral health status, leading to an increase in periodontal disease and changes in dental caries.
Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MorePurpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables