Background: Environmental tobacco smoking is produced by active smokers burning the tip of a cigarette and breathed by nonsmokers and measured by cotinine level. It has the potential to raise the risk of periodontal disease. One of the most frequent chronic diseases in adults is periodontal disease. The lower maternal-fetal attachment has been found to predict smoking status in previous studies, but no research has examined whether maternal-fetal attachment predicts environmental tobacco smoking. This study assessed the effects of maternal environmental tobacco smoke exposure on periodontal health and mother-infant bonding concerning salivary cotinine levels. Materials and methods: This is a comparative cross-sectional study comparing environmental tobacco smoke on exposed and non-exposed mothers aged between 20-35 years with their infants aged up to one year who attended primary health care centers in rural areas of AL-Karkh sector/Baghdad. Along with the essential socio-demographic data, a secondhand smoke exposure scale and postpartum bonding questionnaire were employed. Collection of unstimulated saliva from mothers was done according to Navazesh and Kumer in 2008. After that, the clinical Assessment of gingival bleeding and periodontal pockets was performed by using Community Periodontal Index according to the world health organization in 1997. Results: Out of 150 subjects,67(44.66%) were exposed to environmental tobacco whereas the non-exposed mothers were composed of 83 (55.33%). The highest mean number of CPI0(healthy gingiva) and CPI1(gingival bleeding) were among the non-exposed mothers while the highest mean number of CPI2(dental calculus), CPI3 (shallow pocket 4-5mm) and CPI4(deep pocket 6mm or more) were among the exposed mothers. The mean value of cotinine level among the non-exposed mothers was lower than exposed mothers with significant results. A higher salivary cotinine level was linked to a lower maternal-fetal bonding score. Conclusions: Mother’s exposure to environmental tobacco smoke significantly negatively impacts periodontal disease. Furthermore, mothers who have a stronger sense of attachment and affiliation to their fetus have lower salivary cotinine concentrations than mothers who have a less sense of fetal attachment.
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
The correct and sincere process of socialization is working on appropriate social climate in
which this process is the provision, and the climate is achieved in the presence of a positive
environment free of negatives and contradictions, but when there is a socialization processes
inadequate and contradictory was not based on the principles of punishment and reward nor a
balance between methods soft and intensity of treatment and interaction with small and
adolescent does not require intensive social care formulas do not create the conditions
essential items required by the successful and effective socialization, the young and the young
people who are going through in such Altanisah and educational operations will be
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreNew data on jumping spiders (Salticidae) and tangle-web spiders (Theridiidae) of Armenia are provided on the basis of recently collected specimens in various regions of Armenia. One species, Ballus rufipes (Simon, 1868) is recorded as new to the Caucasus Region, in addition to the following species: Neon reticulatus (Blackwall, 1853), Pellenes brevis (Simon, 1868), Salticus scenicus (Clerck, 1757) and Synageles dalmaticus (Keyserling, 1863) that belong to a family Salticidae, are recorded in Armenia for the first time.
A further 7 species of Theridiidae are recorded in Armenia for the first time Kochiura aulica (C. L. Koch, 1838), Steatoda albomaculata (De Geer, 1778), Steatoda bipunctata (Linnaeus, 1758), Steatoda castanea Clerk, 175
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More