Background: Dental caries and periodontal disease are the most common and widely spread diseases affecting humans at different ages. Aim of this study is the assessment of prevalence and severity of dental caries, gingivitis, oral hygiene and enamel anomalies in relation to gender and residency among 15 years old students in Maysan governorate –Iraq. Materials and methods: The total sample composed of 750 students (400 males and 350 females, 450 urban and 300 rural) selected randomly from different high schools in the Governorate. Diagnoses and recording dental caries was according to the criteria of WHO (1987), Plaque index of Silness and Loe (1964) was used for plaque assessment, Ramfjord index (1959) was applied for the assessment of calculus, gingival index of Loe and Silness (1963) was followed for recording gingival health condition and criteria of WHO (1997) to assess enamel anomalies. Results: Caries prevalence was found to be (92.53%) of the total sample. The DMFS value was higher among females compared to males with statistically high significant difference (P<0.01) also the value was higher among rural compared to urban with statistically high significant difference (P<0.01). Plaque, gingival and calculus indices were higher among rural than urban and higher among males than females, statistically, there were high significant differences regarding plaque and gingival indices (P<0.01) while non-significant difference regarding calculus index (P>0.05), for both genders and residencies. Conclusion: A high prevalence of dental caries and gingivitis were recorded indicating the need of a public health programs in this governorate.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreWith the development of communication technologies, the use of wireless systems in biomedical implanted devices has become very useful. Bio-implantable devices are electronic devices which are used for treatment and monitoring brain implants, pacemakers, cochlear implants, retinal implants and so on. The inductive coupling link is used to transmit power and data between the primary and secondary sides of the biomedical implanted system, in which efficient power amplifier is very much needed to ensure the best data transmission rates and low power losses. However, the efficiency of the implanted devices depends on the circuit design, controller, load variation, changes of radio frequency coil’s mutual displacement and coupling coef
... Show MoreBiomedical alloy 316L stainless steel enhancing to replace biological tissue or to help stabilize a biological structure, such as bone tissue, enhancing were coated with deposition a thin layer of silver nanoparticles as anti-bacterial materials by using DC- magnetron sputtering device. The morphology surface of The growth nanostructure under the influence of different working pressure were studied by atomic force microscope. The average grain size decrease but roughness of the silver thin layer was increased with‖ ―increasing the working pressure. The thickness of silver thin layer was increased from 107 nm at 0.08 mbar to 126 nm at 1.1 mbar. Antimicrobial activity of silver thin layers at different working pressure were studied. Th
... Show MoreXXXX
This study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged
... Show MoreThe aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.
In this work, we construct projectively distinct (k,3)-arcs in the projective plane PG(2,9) by applying a geometrical method. The cubic curves have been been constructed by using the general equation of the cubic. We found that there are complete (13,3)-arcs, complete (15,3)-arcs and we found that the only (16,3)-arcs lead to maximum completeness
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More