Background: University dental students perceived a higher level of stress prior to the final exam associated with raised salivary cortisol levels which could be considered as a useful noninvasive biomarker for measuring acute stress. Using a Helkimo anamnestic and clinical dysfunction scoring for temporomandibular disorders can give a better insight about the association of this marker and temporomandibular joint disorders. The aim of this study was to evaluation level of salivary cortisol in stressor students with temporomandibular disorder and the relation between this marker in relation to temporomandibular disorder severity. This might give a better understanding to the role of psychological stress as an etiological factor for developing temporomandibular joint problems. Materials and methods: A total eighty participants age between 20 to 24 were recruited for this study. The participants were University dental students under graduate students at final examination period who were examined and gave saliva samples in final examination period. Salivary assay kits as cortisol was used to measure those variables and a Helkimo anamnestic and clinical dysfunction scoring for TMD. Results: The group of participants with stress and temporomandibular disorder showed significantly higher levels of salivary cortisol than the control group, the salivary cortisol has statistically significant correlation with Helkimo anamnestic categories (Di-I mild, Di-II moderate and Di-III severe. Salivary cortisol levels show significant but weak association with two categories of clinical dysfunction criteria in Helkimo index system, which are Muscle pain and TMJ pain on palpation. Conclusion: This study demonstrated that University students perceived a high level of stress before the final examination. Salivary cortisol is the stress biomarker that is most often used to measure acute stress. Helkimo anamnestic and clinical dysfunction scoring criteria for still the pioneer for measuring a temporomandibular disorder.
Praise be to God, Lord of the worlds, and the best of prayers, and extradition was made to our master Muhammad and his whole family and companions:
And after:
Surat Al-Qariah is from the royal fence, which is in the thirtieth part of the Noble Qur’an. The commentators differed on the number of verses, and the reason for its naming. This surah talked about the conditions of people on the Day of Resurrection, and about how people were removed from their graves, all of which I spoke about in the preamble.
The research is divided into six topics: the first topic dealt with strange terms, while the second topic dealt with the most important audio issues mentioned in the surah, namely (slurring, advertising, substitution, and silenc
Genetic Algorithms (GA) is a based population approach. It belongs to a metaheuristic procedure that uses population characteristics to guide the search. It maintains and improves multiple solutions which may produce a high-quality solution to an optimization problem. This study presents a comprehensive survey of the GA. We provide and discuss genetic algorithms for new researchers. We illustrate which components build up the GAs and view the main results on complexity time.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
Multi-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the chara
... Show More In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreThis study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.
Background: Chronic subdural hematoma is a blood collection in the subdural space for more than 3 weeks from the onset of the bleeding. It is more likely to develop in infancy and after the age of 60 years. The incidence of subdural hematoma is 1- 2 per 100,000 people per year.
Objective: To delineate the most common feature aspects of SDH like age, predisposing factors, symptoms and signs and different types of management of the disease.
Patients and Methods: A prospective study of 40 patients from the period January 2012 - January 2014, and conducted in Gazi Al-Hariri Hospital of Surgical Specialties, disregarding the age, complaining of chronic subdural hematoma as proved by CT
In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to