Purpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palatal bone. The bone gets relatively thicker closer to the apex. The buccal bone for all lower incisors was less than 1 mm at 3- and 6-mm distance. It was slightly thicker at the central incisor as compared to the lateral at 9-mm distance. Genders have a difference in the thickness of the palatal alveolar bone in their right and left lateral incisors, which are 3mm and 9mm, respectively. Alveolar bone thickness is significantly positively correlated with several teeth. Conclusions: Males and females in this study showed comparable alveolar bone thickness. The alveolar bone thickness increased with increasing age. It is essential to assess the thickness of alveolar bone pre-orthodontic treatment (especially for patients with thin biotype, and those cases that involve labial proclination of the lower incisors).
Uropathogenic E. coli (UPEC) is problematic and still the leading cause of urinary tract infections worldwide. It is developed resistance against most antibiotics. The investigation, surveillance system, and efficient strategy will facilitate selecting an appropriate treatment that could control the bacterial distribution. The present study aims to investigate the epidemiology and associated risk factors of uropathogenic E. coli and to study their antibiotic resistance patterns. 1585 midstream urine specimens were collected from symptomatic urinary tract infections (UTI) patients (225 males and 1360 females) admitted to Zakho emergency hospital, Zakho, Kurdistan Region, Iraq from January 2016 until the end of December 2
... Show MoreABSTRACT Porous silicon has been produced in this work by photochemical etching process (PC). The irradiation has been achieved using ordinary light source (150250 W) power and (875 nm) wavelength. The influence of various irradiation times and HF concentration on porosity of PSi material was investigated by depending on gravimetric measurements. The I-V and C-V characteristics for CdS/PSi structure have been investigated in this work too.
Social risks posed a great challenge to the development path in Iraq, which resulted in widening the development gaps, whether these gaps were between rural and embargoed areas, or between Iraqi governorates, and the gender gap. Besides, the nature of the reciprocal relationship between the social risks and the development process requires the adoption of development trends that are sensitive to the risks that take upon themselves the prompt and correct response to these risks, away from randomness and confusion that Iraq suffered from for decades. However, currently, the situation has differed a great deal. This is because the size and types of such gaps have widened and become more complicated than before; a matter which has led to hav
... Show MoreThe current study presents an experimental investigation of heat transfer and flow characteristic for subcooled flow boiling of deionized water in the microchannel heat sink. The test section consisted of a single microchannel having 300μm wide nominal dimensions and 300μm height (hydraulic diameter of 300μm). The test section formed of oxygen-free copper with 72mm length and 12mm width. Experimental operation conditions spanned the heat flux (78-800) kW/m2, mass flux (1700 and 2100) kg/m2.s at 31˚C subcooled inlet temperature. The boiling heat transfer coefficient is measured and compared with existing correlations. Also, the experimental pressure drop is measured and compared with microscale p
... Show MoreThe aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally
... Show MoreIn this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.
This paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreAbstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More