Background: Nutritional Rickets is a condition produced by an absence of Vitamin D, calcium or phosphate. It clues to relaxing and fading of the bones. Dental expression of children with rickets contains enamel hypoplasia and delayed tooth eruption. This study was conducted in order to assess caries experience (dmfs) and enamel defects among study and control groups, and to evaluate and compare the levels of selected salivary biomarkers between children with nutritional rickets and apparently healthy children. Material and methods: Assessment of caries according to WHO in 1987, and assessment of enamel defects according to enamel defect index EDI of WHO in 1997. In addition a stimulated saliva samples were collected according to Palone et al from 30 children diagnosed with nutritional rickets and 30 control children as control group. Salivary vitamin D, calcium, phosphate and alkaline phosphtase were analyzed. Results: Caries experience represented by dmfs was significantly higher among control group compared to study group, while enamel hypoplasia was higher in study group than control group. Salivary inorganic component (Ca, PO4 ALP) revealed obvious variations between study and control group. Salivary vitamin D concentration was lower in study group compared with control group. Conclusion: Based on the results, it can be concluded that nutritional rickets impact on certain salivary biomarkers which can be considered for evaluating the diagnosis and prognosis of caries experience and enamel defects in nutritional rickets children
In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show MoreNoor Oil Field is one of Iraqi oil fields located in Missan province / Amarah city. This field is not subjected to licensing rounds, but depends on the national effort of Missan Oil Company. The first two wells in the field were drilled in seventies and were not opened to production until 2009. The aim of this study is to study the possibility of using the method of gas lift to increase the productivity of this field . PROSPER software was used to design the continuous gas lift by using maximum production rate in the design.
The design was made after comparing the measured pressure with the calculated pressure, this comparison show that the method of Beggs-Brill and Petroleum Exper
... Show MoreYouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreAl Huweizah Marsh is considered as the largest marsh at the southern part of Iraq. About one third of the marsh is located within the Iranian territory. Iran began to construct earth dikes along the Iraqi-Iranian international borders to separate the Iranian part of the marsh. The electrical conductivity, EC, value was adopted to be the indicator for the water salinity within the marsh. A steady two-dimensional water quality routing model was implemented by using the RMA2 and RMA4 softwares within the SMS computer package to estimate the distribution of the
EC values within the marsh seasonally during the wet, moderate and dry water years. The EC distribution Patterns were estimated considering the expected two cases of the marsh futu
In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreABSTRACT
The research aims to know the reality of a two examined variables at the organization studied identifying the relationship between managerial processes reengineering and organizational citizenship behavior. The research applied on the Electronic Manufacturing Company encompassing a sample of managers and employees consisted of (100) individuals. A questionnaire is the main instrument for data gathering, which has been included (45) questions as well as personal interviews to support the questionnaire's questions and to achieve greater realism for collecting information.
Answers were analyzed to reach the final results through the use of a number of statistical methods via
... Show More