Background: Because of wide use of Functional Endoscopic Sinus Surgery (FESS) technique in the recent years and basic role of coronal computed tomography (CT) scan in demonstrating the normal drainage route of para-nasal sinuses, identifying the major patterns of inflammatory sinonasal disease and accompanied anatomical variations is essential for appropriate preoperative surgical planning. In review of publisthed literature, there is no data on CT patterns of chronic inflammatory sinonasal disease and their accompained anatomical variations of nose and PNS in our local population.Objectives: was to determine the frequency of CT patterns and variations in patients with sinonasal symptoms.Methods: This was a cross sectional descriptive study conducted on 404 consecutive patients with clinical manifestations of chronic rhinosinusitis referred to radiology department of Alkindy teaching hospital. Coronal and if needed axial CT scan were taken from them. CT scans were reviewed and inflammatory patterns and accompanied anatomical variations were specified.Results: Five major recurring patterns of inflammation including infundibular 23.76%, ostiomeatal unit (OMU) 21.78%, sphenoethmidal recess (SER) 7.92%, sinonasal polyposis 19.80% and sporadic 20.79% were seen. Special pattern was noted in 3.96% while normal CT examination was noted in 9.90%. The total percentage was more than 100% due to simultaneous occurance of more than one pattern in the same case. In 73.2% of cases accompanied anatomical variation including septal deviation (34%), concha bullosa (26%), Agger nasi cell (13%), giant bulla ethmoidalis (12%), Haller cell (8%), pneumatization of uncinate process (5%), paradoxic middle turbinate (4%), and Onodi cell (2%) were seen.Conclusion: In this study, the concept of the major inflammatory patterns of sinonasal disease was introduced and their frequncies in our local poluplation were reported. By applying these patterns to the radiological report, more tailored and safe endoscopic sinus surgery could be possible
Background:Periodontal diseases are infectious diseases in which periodontalpathogens trigger chronic inflammatory and immune responses. Interleukine-6 is a multifunctional cytokine playing a central role in inflammation and tissue injury.The aim of the study IS to determine the level of Interleukin-6(IL-6) in saliva of patients with chronic periodontitis compared to healthy subjects. Materials and Methods:The total subjects of the present study is 60, divided into 3 groups; 20 patients with chronic periodontitis with pocket depth(PD ≥4 mm)(group I), 20 patients with pocket depth(PD <4 mm) with clinical attachment loss (group II), and 20 healthy controls with pocket probing depth (PPD ≤ 3 mm) without clinical attachment loss (g
... Show MoreBackground: Periodontitis and Atherosclerosis Cardiovascular disease are chronic inflammatory diseases which are highly prevalent. During the last two decades, there has been an increasing interest in the impact of oral health on atherosclerosis and subsequent cardiovascular disease.Aims of the study wereto evaluate the periodontal health status in study groups (Atherosclerotic cardiovascular disease patients with chronic periodontitis and patients having chronic periodontitis),to estimate the serum levels of Matrixmetalloproteinase-8(MMP-8) and high sensitive C-reactive protein(hs CRP) in study and control groups and compare between them. Also,test the correlation between the serum levels of MMP-8 and hs CRP with clinical periodontal par
... Show Moreole in all sta
Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and flui
... Show Moreole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show MoreIn this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show More