Preferred Language
Articles
/
jbcd-229
Oral signs and symptoms and hyperglycemic status of type II diabetic patients in relation to cytomorphometric findings of gingival and buccal cytobrush smears
...Show More Authors

Background: Brush cytology is an accepted technique that gets renewed interest. It is now used as an aid for the diagnosis and observation of possible epithelial changes that could be associated with oral mucosal diseases. This study aimed to evaluate the cytomorphometric changes in gingiva and buccal mucosa of type II diabetics and to assess their relation to oral symptoms and glycemic status. Materials and methods: Cytological Papanicolaou stained smear were prepared from cheek and gingiva of 20 non treated cases, 20 treated diabetics and 20 healthy persons of both sex after measuring their HbA1c and recording their oral symptoms. Hundred unfolded epithelial cells were evaluated qualitatively using MCID software to measure nuclear and cytoplasmic areas, ratio, perimeters, and form factors. Different statistical analyses were used to determine relations between studied parameters. Results: Diabetics smears showed large nucleus, small cytoplasm, and small cytoplasm/nucleus ratio compared with healthy persons with no sex variation. Xerostomia and burning sensation were significantly correlated with nuclear parameters, while HbA1c was significantly correlated with both cytoplasmic and nuclear parameters. Well-controlled patients showed reduction in nuclear area, but nucleus and cytoplasm form factors were unlike normal. Conclusions: Oral cytology from type II diabetics is associated with detectable cytomorphometric changes that is better demonstrated in buccal than gingival mucosa and tend to return partially to their normal values in well-controlled patients, with no sex variation. NA seems to be the main parameter that changed during hyperglycemia and xerostomia, while both NA and CA were related to burning sensation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Cooling and Heating a Greenhouse in Baghdad by a Solar Assisted Desiccant System
...Show More Authors

Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Dental Caries and Treatment Needs among Kindergarten Children in Al-Basrah Governorate/Iraq
...Show More Authors

Background: Dental caries is a disease occurs in the world in both developed and developing countries, it is still widespread among children and it can be controlled but not eliminated , most of tooth loss occurs due to dental caries and its complications. The aim of this study was to estimate the occurrence, and severity of dental caries and treatment needs among kindergarten children in Al-Basrah governorate. Materials and methods: The sample consisted of 1000 kindergarten children at age of 4-5 years old (445 boys and 555 girls) from urban areas in Al-Basrah city. Diagnosis and recording of dental caries and treatment needs were done according to the criteria of WHO (1987). Results: The percentage of dental caries was (80.8%) of the tota

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Applied Linguistics And English Literature
Human Rights at Stake: Shirley Jackson’s Social and Political Protest in “The Lottery”
...Show More Authors

Nowhere is American author Shirley Jackson’s (1916-1965) social and political criticism is so intense than it is in her seminal fictional masterpiece “The Lottery”. Jackson severely denounces injustice through her emphasis on a bizarre social custom in a small American town, in which the winner of the lottery, untraditionally, receives a fatal prize. The readers are left puzzled at the end of the story as Tessie Hutchinson, the unfortunate female winner, is stoned to death by the members of her community, and even by her family. This study aims at investigating the author’s social and political implications that lie behind the story, taking into account the historical era in which the story was published (the aftermath of th

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Experimental Parasitology
An Acanthamoeba castellanii metacaspase associates with the contractile vacuole and functions in osmoregulation
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Fabrication and Characterization CdO: In/Si Photovoltaic Solar Cell Prepard By Thermal Evaporation
...Show More Authors

Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Information Sources and their Role in E-learning from Iraqi College Students’ Viewpoint
...Show More Authors

The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
Camille Ben Ziad and his Place in the Arab-Islamic Heritage (Historical Study)
...Show More Authors

In a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Poster design and its role in drug control: باسم محمد صالح مهدي الخالدي
...Show More Authors

Our dear country faces many and varied challenges aimed at its history, civilization, its people, the scourge of drugs and psychotropic substances and their misuse. Therefore, we have a historical, ethical and professional responsibility to coordinate efforts and cooperation between all concerned to protect the Iraqi society from the threat of this scourge. Creative sources have varied in the variety of expressive means in politics, literature and the arts, in their style and technical treatment of various topics with innovative manifestations and intuitive interactive with visions as well as influences Psychological expressive descriptions of visual scene, it is one of the media and propaganda that contribute to the raising and developm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref