Background: Halitosis represents a common dental condition, although sufferers are often not conscious of it. It is common among humans around the world and is usually caused by an accumulation of bacteria in the mouth as a result of gum disease, food, or plaque. This study aimed to determine the prevalence of oral hygiene practices, smoking habits and halitosis among undergraduate dental students and correlate the oral hygiene practices, oral health conditions to the prevalence of self perceived oral malodor. Materials and Methods: Clinical examination of 250 dental students and a self-administered questionnaire were included in this study. A questionnaire was developed to assess the self-reported perception of oral breath, awareness of bad breath, timing of bad breath, oral hygiene practices, caries and bleeding gums, dryness of the mouth, smoking and tongue coating. Results: The results indicated that female students had better oral hygiene practices. Significantly less self-reported oral bad breath (P = 0.000) was found in female dental students (40%) as compared to male (70%). It was found that smoking had statistically highly significant correlation with halitosis (P = 0.000). Presence of other oral conditions such as dental caries and filled carious lesions also showed higher prevalence of halitosis in dental students. Conclusion Oral hygiene practices and oral health conditions are very important factors in halitosis. Females exhibited better oral hygiene practices and less prevalence of halitosis as compared to male students.
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThis paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreSpot panchromatic satellite image had been employed to study and know the difference Between ground and satellite data( DN ,its values varies from 0-255) where it is necessary to convert these DN values to absolute radiance values through special equations ,later it converted to spectral reflectance values .In this study a monitoring of the environmental effect resulted from throwing the sewage drainages pollutants (industrial and home) into the Tigris river water in Mosul, was achieved, which have an effect mostly on physical characters specially color and turbidity which lead to the variation in Spectral Reflectance of the river water ,and it could be detected by using many remote sensing techniques. The contaminated areas within th
... Show MoreThe microdrilling and nanodrilling holes are produced by a Q-switched Nd :YAG laser (1064 nm) interaction with 8009 Al alloy using nanoparticles. Two kinds of nanoparticles were used with this alloy. These nanoparticles are tungsten carbide (WC) and silica carbide (SiC). In this work, the microholes and nanoholes have been investigated with different laser pulse energies (600, 700 and 800)mJ, different repetition rates (5Hz and 10Hz) and different concentration of nanoparticles (90%, 50% and 5% ). The results indicate that the microholes and nanoholes have been achieved when the laser pulse energy is 600 mJ, laser repetition rate is 5Hz, and the concentration of the nanoparticles (for the two types of n
... Show MoreA potentiostatic study of the behaviour of Inconel (600) in molar sulphuric acid has been carried out over the temperature range 293-313 K. Values have been established for the potentials and current densities of the corrosion, active-passive transition, passivity and transpassive states. For corrosion, the current density (ic) and potential (Ec) have been determined from well-defined Tafel lines. The potential and current density prior to the commencement of passivity have been obtained corresponding respectively to the critical potential (Ecr( and to the current density (icr) for the active-passive transition state. The passive range was defined by the respective potentials and current densities for passive film formation and dissolutio
... Show More