Influence of Socioeconomic Status and Expectations among Completely Edentulous Patients on Conventional Complete Denture Treatment
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Objective: The purpose of this study was to determine the effect of socioeconomic status on patient expectation from the treatment through a Questionnaire based survey. Material and Method: The Present study was conducted in region of Delhi. 1500 completely edentulous patients with age group of 63-74 yrs who report to Dental OPD first time are taken for the study from the period of January 2015 to January 2016.The sample questionnaire was designed to test the hypothesis. Results were statistically evaluated. Results: Out of 1500 patients,percentage of Upper, Upper middle,Lower middle and Upper Lower and Lower class who had higher expectations from treatment was greatest. Percentage of Patients with No expectation from treatment were highest in Upper Lower and Lower classes. Conclusion: Socioeconomic status of the patients had definite influence on Expectation .Communication and patient education is essential for all socio-economic classes of patients and it becomes even more important for Lower middle and Lower Classes of patients.
Authors and Affiliations
Monika Saini, , Yashpal Singh , Suraj Suvarna
Design of Non-Volatile SRAM Using Magnetic Tunnel Junction
In the last 10 years, FPGA circuits have developed rapidly, because of their flexibility, their ease of use and the low cost to design a function with them. However, the internal memories used in FPGA circuit could limit...
Using Concept of Steganography and Visual Cryptography for Secured Data hiding
Abstract: The most advanced and updated Shamir Encryption algorithm is efficient enough to prevent and stop unauthorized and illegal access to the secured encoded data. It is best to solution to ensure reliability...
A Novel Irreversible Transformation Scheme for Biometric Template Protection
Abstract: Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can...
Protecting the movable Endeavor with Network-Based validation and Virtual Computing
A new security architecture for the mobile enterprise which uses network-based security and cloud computing has been proposed in these paper. This newly proposed architecture is mainly for both simplifying ...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Packets
Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed wire...