Background: Pregnancy is considered a major risk factor for development and progression of periodontal disease. There are hormonal changes in both estrogen and progesterone hormones in addition to bacterial effect and poor oral hygiene that will enhance development of periodontal disease in pregnant women. Materials and methods: Seventy subjects were enrolled in the study, the subjects with an age range (20-35) years old without any history of systemic disease. The subjects were divided into 20 non-pregnant women they represent the control group (G I), 30 pregnant women with gingivitis (GII) and 20 pregnant women with periodontitis (GIII).All periodontal parameters (plaque index, gingival index, bleeding on probing, probing pocket depth and clinical attachment level) were recorded and 5ml of unstimulated saliva was collected for each subject. The collected saliva was centrifuged and clear supernatant was collected and kept frozen until biochemical analysis of salivary enzymes which included ALP, LDH and salivary Calcium. Results: No significant difference in the mean value of salivary ALP between GI and G II, while there is high significant difference between GI and GIII. There was significant difference in the salivary LDH and Ca levels between control group and group II, while there is highly significant difference of salivary LDH and Ca between group I and group III.There was significant difference in the number of bleeding sites, and probing pocket depth (PPD) among all groups. There was increase in the total number of all scores of PPD (score 1,2 and 3) GII and GIII compared to GI. Conclusions: Thepregnant women revealed more periodontal disease conditions (gingivitis and periodontitis) due to hormonal changes superimposed with microbial infection. Salivary enzymes (ALP, LDH) and salivary calcium are considered as good biochemical markers of periodontal tissue destruction and can be used to evaluate the effect of pregnancy on periodontal health status.
This work was conducted to determine the volumetric mass transfer coefficient (Ky.a) infixed bed adsorption using hexane-benzene mixture by adsorption onto a fixed bed of white silica gel. Benzene concentration was measured by gas chromatography. The effect of feed flow rate and initial concentration of benzene in hexane-benzene mixture on the volumetric mass transfer coefficient and on the adsorption capacity of silica gel was investigated.
In general, the volumetric mass transfer coefficient increases with increasing hexane flow rate, and with increasing initial concentration of benzene in the mixture. The ultimate value of (Ky.a) was at 53 ml/min of hexane flow rate with benzene initial concentration of (6.53 wt. %), and it wa
... Show MoreObjectives: The demand for orthodontic treatment is nowadays increasing significantly for aesthetic improvement and to correct various kinds of malocclusion, yet the prolonged treatment time remains the main obstacle. This review aimed to demonstrate various orthodontic techniques and highlight the evidence-based successful approaches used for acceleration of orthodontic tooth movement. Materials and Methods: Data and sources of information pertaining to accelerated orthodontic tooth movement premised on English-written articles were searched using electronic databases including Google Scholar, Scopus, PubMed and MEDLINE. Results: This review demonstrated the availability of different surgical and non-surgical methods to enhance tooth movem
... Show MoreOut of the search for the truth, the reader of the Holy Qur’an should know the fate of the sorcerers whom Pharaoh threatened when they announced it as pure monotheism in front of seeing the stick as it turned into a clear serpent, when they said: We believe in the Lord of the worlds, the Lord of Moses and Aaron, and the clear promise came to cut and crucify the trunks of palm trees, and they said what they said if Being supplicants to God (May God cause us to die as Muslims), did Pharaoh actually carry out what he promised them?? So we studied that subject from this angle. Because what looms on the horizon of the Holy Qur’an is that there is no one who seeks refuge with God Almighty in times of adversity except that God Almighty has
... Show MoreThe Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable
... Show MoreThe graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreNew developments imposed different patterns of interactions between major international powers and Iran during 2018, ranging to varying degrees between cooperation and tension, the most important of which is the new measures taken by the United States to withdraw from the nuclear agreement and impose new US sanctions on Iran, which in turn insisted on not responding to pressure to which they are exposed to make changes in their policies and to negotiate again about the main contentious files, especially the nuclear program and ballistic missiles, and the roles they play for crisis countries, especially supporting some armed organizations in Syria, Lebanon, Iraq and Yemen. These differences have put the international forces before difficult
... Show MoreDBN Rashid, International Journal of Innovation, Creativity and Change, 2020