Background: Periodontitis is an infection attributable to multiple infectious; it causes an interrelated cellular and humoral host immune responses. Recent reports have indicated that human cytomegalovirus (HCMV) may contribute to pathogenesis of periodontitis. The HCMV can stimulate the release of cytokines from inflammatory and non-inflammatory cells and weaken the periodontal immune defense. This study aimed to reveal the presence of anti-CMV IgG, and determine the levels of ILâ€6 and TNF-α and to correlate the presence of cytomegalovirus (CMV) with cytokines levels. Materials and Methods: Forty patients with chronic periodontitis and 40 healthy control subjects (their age and sex were matched with the patients) were involved in this study. Periodontal parameters used in this study included plaque index (PLI), gingival index (GI), probing pocket depth (PPD), clinical attachment level (CAL) and bleeding on probing (BOP). Saliva samples were taken from all subjects. ELISA was carried out to estimate the levels of anti-CMV IgG, ILâ€6 and TNF-α. Statistical tests used involved t-test, Mann-Whitney, Chi-square, Fisher exact and spearman's correlation test. Results: This study found a significant difference (p<0.05) in the frequency of anti-CMV IgG in saliva between patients and controls. The number and percentage of patients group who had positive for anti-CMV IgG were 14 (35%), while controls were 5 (12.5%). A significant increase was found in mean of PPD, CAL and BOP among patients with the positive IgG as compared to those patients with the negative IgG. In addition, there was a significant elevation in the salivary levels of ILâ€6 and TNF-α in patients compared with healthy controls. IL- 6 was significantly associated with GI and BOP, whereas TNF-α was significantly associated with PPD and CAL. On the other hand, there was a significant correlation between TNF-α and anti- CMV IgG. Conclusion: The findings revealed that the significant association between the presence of virus with periodontal parameters and cytokines level in patients group gives additional evidence toward the potential importance of the direct and indirect effects of CMV infection in periodontitis. Keywords: Periodontitis, Anti- CMV IgG, Cytokines.
The main goal of this paper is to introduce the higher derivatives multivalent harmonic function class, which is defined by the general linear operator. As a result, geometric properties such as coefficient estimation, convex combination, extreme point, distortion theorem and convolution property are obtained. Finally, we show that this class is invariant under the Bernandi-Libera-Livingston integral for harmonic functions.
The influence and hazard of fire flame are one of the most important parameters that affecting the durability and strength of structural members. This research studied the influence of fire flame on the behavior of reinforced concrete beams affected by repeated load. Nine self- compacted reinforced concrete beams were castellated, all have the same geometric layout (0.15x0.15x1.00) m, reinforcement details and compressive strength (50 Mpa).
To estimate the effect of fire flame disaster, four temperatures were adopted (200, 300, 400 and 500) oC and two method of cooling were used (graduated and sudden). In the first cooling method, graduated, the tested beams were leaved to cool in air while in the seco
... Show MoreA total of 680 fish specimens belonging to 31 species from the Yemeni coastal waters of the Red Sea were inspected for the isopod infestations. Four isopod species belonging to three families of the suborder Cymothoida were detected. These are: Aega psora (Linnaeus, 1758) from Lethrinus lentjan, Natatolana insignis Hobbins and Jones, 1993 from Abalistes stellatus, Excorallana tricornis (Hansen, 1890) from Epinephelus fuscoguttatus, E. guttatus and E. tauvina and Alcirona krebsi Hansen, 1890 from Epinephelus microdon. All these isopod species are reported here for the first time from the Yemeni coastal waters of the Red Se
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThis paper investigates the experimental response of composite reinforced concrete with GFRP and steel I-sections under limited cycles of repeated load. The practical work included testing four beams. A reference beam, two composite beams with pultruded GFRP I-sections, and a composite beam with a steel I-beam were subjected to repeated loading. The repeated loading test started by loading gradually up to a maximum of 75% of the ultimate static failure load for five loading and unloading cycles. After that, the specimens were reloaded gradually until failure. All test specimens were tested under a three-point load. Experimental results showed that the ductility index increased for the composite beams relative to the reference specim
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More