Background: University dental students perceived a higher level of stress prior to the final exam associated with raised salivary alpha-amylase levels which could be considered as a useful noninvasive biomarker for measuring acute stress. Using a Helkimo anamnestic and clinical dysfunction scoring for temporomandibular disorders can give a better insight about the association of this marker and temporomandibular disorders. The aim of this study was to evaluation level of salivary alpha-amylase in stressor students with temporomandibular disorders and the relation between the marker in relation to temporomandibular disorders severity. This might give a better understanding to the role of psychological stress as an etiological factor for developing temporomandibular joint problems. Materials and Methods: A total eighty participants aged between 20 to 24 were recruited for this study. The participants were University dental students under graduate students at final examination period who were examined and gave saliva samples in final examination period. Salivary assay kits as alpha-amylase was used to measure those variable and a Helkimo anamnestic and clinical dysfunction scoring for temporomandibular disorders. Results: The group of participants with stress and temporomandibular disorders showed significantly higher levels of salivary alpha-amylase than the control group, the salivary alpha-amylase has statistically non-significant correlation with Helkimo anamnestic categories (Di-I mild, Di-II moderate and Di-III severe. Salivary alpha-amylase levels show non-significant and weak association with two categories of clinical dysfunction criteria in Helkimo index system, which are Muscle pain and temporomandibular joint pain on palpation. Conclusion: This study concluded that University students perceived a high level of stress before the final examination. Salivary alpha-amylase is now the stress biomarker that is most often used to measure acute stress. Helkimo anamnestic and clinical dysfunction scoring criteria for still the pioneer for measuring a TMD.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreBackground. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod
... Show MoreThis study investigates asset returns within the Iraq Stock Exchange by employing both the Fama-MacBeth regression model and the Fama-French three-factor model. The research involves the estimation of cross-sectional regressions wherein model parameters are subject to temporal variation, and the independent variables function as proxies. The dataset comprises information from the first quarter of 2010 to the first quarter of 2024, encompassing 22 publicly listed companies across six industrial sectors. The study explores methodological advancements through the application of the Single Index Model (SIM) and Kernel Weighted Regression (KWR) in both time series and cross-sectional analyses. The SIM outperformed the K
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show More<p>Photovoltaic (PV) systems are becoming increasingly popular; however, arc faults on the direct current (DC) side are becoming more widespread as a result of the effects of aging as well as the trend toward higher DC voltage levels, posing severe risk to human safety and system stability. The parallel arc faults present higher level of current as compared with the series arc faults, making it more difficult to spot the series arc. In this paper and for the aim of condition monitoring, the features of a DC series arc fault are analyzed by analysing the arc features, performing model’s simulation in PSCAD, and carrying out experimental studies. Various arc models are simulated and investigated; for low current arcs, the heur
... Show MoreThe oyster ??????? (planned) (Pallas) of lesions that have entered Iraq recently became spyware severe damage in more than a station from power plants in Iraq, including the power plant in Mussayab Vamahar accumulates in pipes cooling and disrupts their work Vtafrtf heat systems cooling and thereby determiningefficiency and lead to added cost many cleaning or replacement of damaged parts
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.