Background: Waterpipe tobacco smoking has become common especially among young people, Waterpipe smoking misconcepted as a safer mean of smoking, so in this study we will highlight the effect of Waterpipe smoking ‎on periodontal and oral health.‎ Materials and method. The selected ‎‎‎100 male subjects of 30-40 years, ‎categorized into 4 groups (each group ‎‎25 subject): Waterpipe smoker ‎with ‎healthy periodontium, ‎Waterpipe smoker ‎‎with chronic periodontitis, Non-‎‎smoker ‎with healthy periodontium and Non-smoker ‎with chronic periodontitis. Whole ‎unstimulated ‎saliva was collected. Clinical measurements: plaque ‎index, ‎gingival index, ‎bleeding on probing, salivary flow ‎rate ‎and ‎salivary pH were recorded‎.‎ ‎ Results. In the healthy groups: plaque index and salivary pH were ‎higher in smokers than non-smokers but with no ‎significant difference (P>0.05). While gingival index and salivary flow rate were ‎higher in smoker than non-smokers and with significant ‎difference (p<0.05). In the chronic periodontitis groups: plaque index, gingival index and salivary flow rate ‎were higher in the non-smokers than smokers and with ‎significant difference (p<0.05). While salivary pH was ‎higher in the non-smokers than smokers but with no ‎significant difference (P>0.05). Correlation between ‎weekly smoking hours with pH and salivary flow rate, in the ‎smoker healthy groups, showed ‎significant negative correlation, while plaque index showed ‎significant positive correlation at (p<0.05). But in the smokers with chronic periodontitis, only gingival index ‎significantly correlated with weekly smoking hours. Conclusion. Waterpipe smoking has a detrimental effect on the periodontium and overall oral health.
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreThe analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.
The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the variance and covariance matrices. Also the analysis of the princ
... Show MoreThe ratio of draft tube to reactor diameters is of decisive importance for the operation behavior of air lift loop reactors. The influence of draft tube geometry was investigated with respect to oxygen mass transfer and mixing time. The diameter ratio was varied between 0.33 and 0.80. The measurements were performed in two loop reactors with liquid capacities of 11.775 and 26.49 liters using aqueous with solutions of different coalescence behavior. The results show that there is no single diameter ratio which would produce most favorable conditions for the two process parameters. With respect to the more important requirements of aerobic cultures, i.e high oxygen mass transfer and efficient mixing, a diameter ratio between 0.5 and 0.6 is
... Show MoreAkaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).
The research aimed to identify the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information. Such goal includes a set of sub-goals: Knowing the reasons for media offices' reliance on the information provided by the Cabinet's website; and revealing the benefit derived from relying on the Cabinet's website.
The researcher used the survey method to screen and comprehend the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information.
The mechanism of comprehensive account of the limits of research wa
... Show MoreDatabase is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreIn contemporary cities, the expansion of the use of vehicles has led to the deterioration of the urban environment. To counter this, many concepts and strategies emerged that attempted to regulate mobility in cities and limit its effects. The concept of a "complete street" is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation methods This paper discusses the role that complete streets can play in developing the urban environment in the Alyarmok District of Baghdad, which suffers from traffic congestion and its associated problems.In this study, 104 people were surveyed in the Alyarmok region, and the linear regression method was used to analyze their op
... Show More