Background: Brush cytology is an accepted technique that gets renewed interest. It is now used as an aid for the diagnosis and observation of possible epithelial changes that could be associated with oral mucosal diseases. This study aimed to evaluate the cytomorphometric changes in gingiva and buccal mucosa of type II diabetics and to assess their relation to oral symptoms and glycemic status. Materials and methods: Cytological Papanicolaou stained smear were prepared from cheek and gingiva of 20 non treated cases, 20 treated diabetics and 20 healthy persons of both sex after measuring their HbA1c and recording their oral symptoms. Hundred unfolded epithelial cells were evaluated qualitatively using MCID software to measure nuclear and cytoplasmic areas, ratio, perimeters, and form factors. Different statistical analyses were used to determine relations between studied parameters. Results: Diabetics smears showed large nucleus, small cytoplasm, and small cytoplasm/nucleus ratio compared with healthy persons with no sex variation. Xerostomia and burning sensation were significantly correlated with nuclear parameters, while HbA1c was significantly correlated with both cytoplasmic and nuclear parameters. Well-controlled patients showed reduction in nuclear area, but nucleus and cytoplasm form factors were unlike normal. Conclusions: Oral cytology from type II diabetics is associated with detectable cytomorphometric changes that is better demonstrated in buccal than gingival mucosa and tend to return partially to their normal values in well-controlled patients, with no sex variation. NA seems to be the main parameter that changed during hyperglycemia and xerostomia, while both NA and CA were related to burning sensation.
Diagnosing heart disease has become a very important topic for researchers specializing in artificial intelligence, because intelligence is involved in most diseases, especially after the Corona pandemic, which forced the world to turn to intelligence. Therefore, the basic idea in this research was to shed light on the diagnosis of heart diseases by relying on deep learning of a pre-trained model (Efficient b3) under the premise of using the electrical signals of the electrocardiogram and resample the signal in order to introduce it to the neural network with only trimming processing operations because it is an electrical signal whose parameters cannot be changed. The data set (China Physiological Signal Challenge -cspsc2018) was ad
... Show MoreA vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Abstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAbstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show MoreBackground: Medical-surgical nurses are responsible of providing competent care to clients with a wide-array of acute and chronic health problems. This challenging task requires arming nurses with advanced competencies of health literacy to effectively educate their clients. However, evidence about medical-surgical nurse’s health literacy-related knowledge and experience is limited. Purposes: This study aimed to determine the level of the health literacy-related knowledge and experience among medical-surgical nurses.Design: A descriptive-cross-sectional study was conducted among a total sample of 177 nurses who were practicing in medical-surgical wards in teaching hospitals in Iraq. A convenience sampling method was used to sele
... Show More