Background: Pregnancy is considered a major risk factor for development and progression of periodontal disease. There are hormonal changes in both estrogen and progesterone hormones in addition to bacterial effect and poor oral hygiene that will enhance development of periodontal disease in pregnant women. Materials and methods: Seventy subjects were enrolled in the study, the subjects with an age range (20-35) years old without any history of systemic disease. The subjects were divided into 20 non-pregnant women they represent the control group (G I), 30 pregnant women with gingivitis (GII) and 20 pregnant women with periodontitis (GIII).All periodontal parameters (plaque index, gingival index, bleeding on probing, probing pocket depth and clinical attachment level) were recorded and 5ml of unstimulated saliva was collected for each subject. The collected saliva was centrifuged and clear supernatant was collected and kept frozen until biochemical analysis of salivary enzymes which included ALP, LDH and salivary Calcium. Results: No significant difference in the mean value of salivary ALP between GI and G II, while there is high significant difference between GI and GIII. There was significant difference in the salivary LDH and Ca levels between control group and group II, while there is highly significant difference of salivary LDH and Ca between group I and group III.There was significant difference in the number of bleeding sites, and probing pocket depth (PPD) among all groups. There was increase in the total number of all scores of PPD (score 1,2 and 3) GII and GIII compared to GI. Conclusions: Thepregnant women revealed more periodontal disease conditions (gingivitis and periodontitis) due to hormonal changes superimposed with microbial infection. Salivary enzymes (ALP, LDH) and salivary calcium are considered as good biochemical markers of periodontal tissue destruction and can be used to evaluate the effect of pregnancy on periodontal health status.
This Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.
This study is trying to identify a new form of Media Web used (Press online or only Press online, Digi
... Show MoreGrain size and shape are important yield indicators. A hint for reexamining the visual markers of grain weight can be found in the wheat grain width. A digital vernier caliper is used to measure length, width, and thickness. The data consisted of 1296 wheat grains, with measurements for each grain. In this data set, the average weight (We) of the twenty-four grains was measured and recorded. To determine measure of the length (L), width (W), thickness (T), weight (We), and volume(V). These features were manipulated to develop two mathematical models that were passed on to the multiple regression models. The results of the weight model demonstrated that the length and width of the grai
Fe, Co and Sb nanopowders were fruitfully prepared by electrical wire explosion method in Double distilled and de-ionized water (DDDW) media. The formation of iron, cobalt and antimony (FeCoSb) alloy nanopowder was monitored by X-ray diffraction. The x-ray diffraction pattern indicates that there are iron, cobalt and antimony peaks. Optical properties of this alloy nanoparticles were characterized by UV-Visible absorption spectra. The absorption peak position is shifted to the lower wavelengths when the current increases. That means the mean size of the nanoparticles controlled by changing the magnitude of the current. The surface morphological analysis is carried out by employing Scanning Electron Microscope (SEM). Particles with varies
... Show MoreThis paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreIn this paper a new series of morpholine derivatives was prepared by reacting the morpholine with ethyl chloro acetate in the presence triethylamine as a catalyst in benzene gave morpholin-N-ethyl acetate(1) which reacted with hydrazine hydrate in ethanol, and gave morpholin-N-ethyl acetohydrazide (2) . Morpholin-N-aceto semithiocarbazide (3) were prepared by reacting compound(2) with ammonium thiocyanate , concentrated hydrochloric acid and ethanol as a solvent .Compound (3) reacted with sodium hydroxide and hydrochloric acid to give 5-(morpholin-N-methylene)-1H-1,2,4-triazole-3-thiol (4) .The new series of 1,2,4-triazol derivatives (5-8) was synthesized by reaction of compound(4) with formaldehyde , DMF as a solvent and different
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More