Background: Anemia of chronic disease (ACD) occurs in the presence of chronic infection, inflammatory conditions or neoplastic conditions despite of adequate iron and vitamins storage. Gingivitis is the inflammation of the gingiva, periodontitis is the inflammation in the periodontium that extend deeper with loss of connective tissue attachment and supporting bone. The main pathogenesis of periodontal diseases and ACD is immune activation. Aims of study: Determine and compare the clinical periodontal parameters (plaque index (PLI), gingival index (GI), bleeding on probing (BOP), probing pocket depth (PPD) and clinical attachment level (CAL)). Evaluate the hematocrit (Hct) level, red blood cells (RBCs) count and white blood cells (WBCs) count. Assess the correlations between the clinical periodontal parameters and hematological parameters at patients had gingivitis, chronic periodontitis (CP) with different severities (mild, moderate and severe) with healthy periodontium subjects. Materials and Methods: 35-50 years old, 150 male subjects were included in this study. They were divided into three study groups: group of 30 patients with gingivitis, group of 90 patients with CP which subdivided into (Mild CP=30 patients, Moderate CP =30 patients, Severe CP =30 patients) and control group 30 subjects with clinically healthy periodontium. Blood samples were collected then by automated blood analyzer the Hct, RBCs and WBCs were evaluated. Results: Comparisons among groups and subgroups revealed significant differences in Hct and WBCs, while RBCs was non-significant. Means values of RBCs count showed reduction in mild and severe CP subgroups. while, the Hct and WBCs mean values increased in patients with periodontal disease. The correlations between the clinical periodontal parameters with WBCs and RBCs were almost non-significant but, with Hct was mostly significant negative correlations. Conclusion: Inflammatory and immune responses in periodontal diseases caused change in different hematologic parameters which could contribute to the development of anemia of chronic disease.
Complement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin
The researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreThe business environment is witnessing great and rapid developments due to the economic and technological development that has caused damage to human beings, which requires the need to reduce this damage and work to protect the environment and participate in supporting the social aspects. This requires economic resources to be realized by the economic units. Economic development in preserving the environment that has caused damage and supporting the social aspects that preserve human rights, enhance their position and satisfy their needs in society. Global professional organizations, the United Nations and stakeholder representatives have been issuing the Global Reporting Initiative (GRI) to find guidelines for the preparation of
... Show MoreIn this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
The research aimed at studying the inhibitive effect of the hot watery dry and ethanolic ginger(85%) and fragrant oil which are added in concentrates of o.o25, o.o5o and 0.1g / 100g respectively in the growth of bacteria and molds. The results of the initial chemical diagnosis showed containment of ginger roots extract on. Alkaloids, Glycosides, Flavonoids and Suponins. The highest inhibitive effect of the bacteria reached the concentrate . 0.1% of the oil extract then the concentrate 0.050% of the ethanolic hot extract follows it. While 0.1% was the least inhibitive concentrate for the hot watery extract. But the inhibitive effect of the hot oily and alcoholic extracts in the numbers of molds colonies was 0.025%, when the concentrate 0.1%
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More