Background: Mother-infant bonding is an important psychological step postpartum and disturbed relationship may carry dramatic consequences as a psychological disorder which may affect the periodontal health of the mother. The aim of the present study was to assess the effect of the postpartum Mother-infant bonding on their periodontal condition. Materials and Methods: Mothers in the postpartum period with age range 20-35 years were subjected to postpartum Bonding Questionnaire (PBQ). Periodontal health status was assessed by measuring probing pocket depth and clinical attachment level. Results: The mean values of both probing pocket depth (PPD) and clinical attachment loss (CAL) were higher among disordered mothers than mothers with normal bonding relationship. The mean percentage of PPD according to different thresholds of severity and CAL (1-2 mm) was higher among the disordered mothers. Conclusion: Mother-infant bonding disorder could influence the periodontal health status of the mother.
Money matters exert a considerable influence on man’s life-style, social
rank and his relationship with other people. This paper aims at exploring the impact
of money matters on the characters’ inner feelings, social status, and personal
relationships in Muriel Spark’s modern novel The Ballad Of Peckham Rye. This
paper aspires to show that Spark’s subtle portrayal of characters reveals the
dominance of money matters over human and social relationships.
Muriel Spark ( 1918-2006) is a modern Scottish novelist whose wit and
detached sense of humour has brought her prolific body of both popular and critical
acclaim. Spark is interested not in building suspense but in exploring the moral
significance of the
Objectives: The study aimed to assess the needs of nurses' knowledge toward post operative wound care and to constructed health educational program upon nurses who are working in surgical wards, to determine the relation between nurses' knowledge and their demographical characteristic which includes ( age, gender, level of education, number of years experience in the surgical wards, years of experience in nursing service, and number of attending an educational sessions), and to identify the impact of the health educational program on their knowledge through perform post-test every two months after imp
This paper aims to explain the effect of the taxes policy including direct & indirect taxes on supporting the domestic Investment in Iraq. This could help the official planners for drawing the future policies that help provoking (istumlating) the domestic investment in Iraq the quantitative analysis approach was adopted using regression model. The results showed the significance of the effects of both direct & indirect taxes policies on domestic as a simple correlation coefficient ( r ) of ( 0.6 ) , ( 0.64 ) respectively.
This study focuses on the basics of cultivation and production of the Wheat Crop in
Wasit Province ; in order to reveal the reality of the geographical distribution of its cultivation
and production.
Wheat is the most important field crops cultivated in Wasit province, as it has vast
possibilities for expansion in growing and production, in which agriculture conducted in a
year and left in other , then changing this method would increase cultivated area of it to nearly
doubled, as well as the possibility of increasing average yields in Donam by using improved
seeds, fertilizer, with the availability of water lever machines, especially wheat is grown in
areas of rivers abutment.
The study showed the spread of th
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
This study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More