Preferred Language
Articles
/
jbcd-816
The effect of cigarette smoking on salivary IgA and periodontal disease
...Show More Authors

Background: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (Group I) and (15) patients with chronic periodontitis who were smokers (Group II) of both gender with an age ranged (35-45) years were the periodontal parameters used in this study (PLI, GI, PPD and CAL), unstimulated salivary sample were collected from all subjects and the levels of salivary IgA (s-IgA) in each sample were analyzed for each group by using enzyme-linked immunosorbent assay (ELISA) technique. A statistical analysis was done by using excel 2013. Results: There was a significant difference with high mean level in the clinical periodontal parameters in smokers group compared to non smokers with chronic periodontitis (PLI, PPD and CAL) except GI which showed no significant difference between the same groups. The biochemical finding showed significant difference with low mean level for (s-IgA) in smokers group compared to non smokers. Conclusion: The findings in this study showed that the concentrations of salivary IgA might be used as an indicator for periodontal disease progression in smokers with chronic periodontitis as a resultant to the effect of smoking which lowering the concentration of the salivary IgA and subsequent reducing of the host’s defense lead to increase in the progression of periodontal disease.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Journal Of College Of Education For Women / Al-iraqiya University
Black-on-Black Bullying in Roy Williams' Fallout
...Show More Authors

Racism is a serious issue that impacts a lot of people around the world. Since slavery days, racial discrimination has been increasing to abhorrent levels in relation to black people. The aim of individual psychology by Alfred Adler is to study human behaviour by situating it in the social context which makes his writing ideal to explanation of racism. This paper aims to study racism in Roy Williams’ Fallout from the perspective of Alfred Adler’s theory. Alfred Adler's individual psychology emphasizes the importance of social factors in shaping individual behavior, including the ways in which individuals form their sense of self and identity. This makes it a valuable framework for understanding the complex social and psychological facto

... Show More
Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
On New Weibull Inverse Lomax Distribution with Applications
...Show More Authors

In this paper, simulation studies and applications of the New Weibull-Inverse Lomax (NWIL) distribution were presented. In the simulation studies, different sample sizes ranging from 30, 50, 100, 200, 300, to 500 were considered. Also, 1,000 replications were considered for the experiment. NWIL is a fat tail distribution. Higher moments are not easily derived except with some approximations. However, the estimates have higher precisions with low variances. Finally, the usefulness of the NWIL distribution was illustrated by fitting two data  sets

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Ruling on dealing with Jews in Muslim countries
...Show More Authors

Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On generalized b*-Closed Sets In Topological Spaces
...Show More Authors

 In this paper, we introduce and study the concept of a new class of generalized closed set which is called generalized b*-closed set in topological spaces ( briefly .g b*-closed) we study also. some of its  basic properties and investigate the relations between the associated topology. 

View Publication Preview PDF
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Generalized Regular Continuous Functions In Topological Spaces
...Show More Authors

In this paper we introduce a new type of functions called the generalized regular
continuous functions .These functions are weaker than regular continuous functions and
stronger than regular generalized continuous functions. Also, we study some
characterizations and basic properties of generalized regular continuous functions .Moreover
we study another types of generalized regular continuous functions and study the relation
among them

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Wed Nov 13 2024
Journal Name
Innovation And Technological Advances For Sustainability
Ecofriendly method to control fusarium wilt on tomato
...Show More Authors

Fusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-anbar Journal Of Veterinary Sciences
Essential of Hygienic Practices on Bacterial Contamination in some Restaurants of Al- Karkh Area, Baghdad, Iraq
...Show More Authors

This study aimed to evaluate good manufacturing practices in food safety of ten different restaurants in the Al-Karkh area of Baghdad, Iraq. Forty samples collected from were collected from knives, food cutting boards, tables, hands and nails workers in restaurants. In addition. 70 food handlers were selected. Through structured interviews, information on the checklist for Good Manufacturing Practices in Food Safety, Food handlers’ general checklist for good hygiene, and Personal Hygiene Checklist were collected. The overall viable bacterial count before Good Hygiene Practices was significantly higher (P<0.05) than the total bacterial counts after Good Hygiene Practices. The highest viable bacterial counts before Good Hygiene P

... Show More
View Publication
Crossref