Background: Alveolar ridge expansion is proposed when the alveolar crest thickness is ≤5 mm. The screw expansion technique has been utilized for many years to expand narrow alveolar ridges. Recently, the osseodensification technique has been suggested as a reliable technique to expand narrow alveolar ridges with effective width gain and as little surgical operating time as possible. The current study aimed to compare osseodensification and screw expansion in terms of clinical width gain and operating time. Materials and methods: Forty implant osteotomies were performed in deficient horizontal alveolar ridges (3–5 mm). A total of 19 patients aged 21–59 years were randomized into two groups: the screw expansion group, which involved 20 osteotomies performed by screw expander drills, and osseodensification group, which comprised 20 osteotomies achieved by osseodensification drilling technique. One millimetre below the alveolar bone crest was measured with a bone caliper at two intervals (before implant osteotomy and after implant osteotomy), and operating time was assessed. Results: Before expansion, the mean alveolar ridge width was 4.20 ± 0.71 mm in the osseodensification group and 4.52 ± 0.53 mm in the screw-expansion group. No statistically significant difference in alveolar bone width before expansion was found between the groups (P > 0.05). After the expansion of the alveolar ridge with osseodensification or screw expansion techniques, the average ridge width was 5.48 ± 0.57 mm in the osseodensification group and 5.71 ± 0.53 mm in the screw-expansion group. Difference in width gain postoperatively between the groups was 0.09 mm, which was not statistically significant (P > 0.05). According to operating time, osseodensification consumed 6.21 ± 0.55 minutes, and screw expansion required 16.32 ± 0.60 minutes for a single implant with a significant difference between the groups (P < 0.0001). Conclusion: Alveolar bone expansion by osseodensification showed comparable width gain and less surgical operating time compared with expansion by screw expansion technique.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreEMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show MoreThe Migration is one of the important dynamic population movement phenomena in population studies because of its great impact in changing many demographic characteristics between the region of origin and arrival. And the multiplicity of forms and types according to the different reasons for it and the motives that prompted the population to move, as well as the currents and their size are also different according to the different causes, and here there are many types of migration, and many of them have been studied at the local and regional levels, and as long as the population is in a continuous dynamic movement, other types of migration are generated. (Al Douri, 2015, 230) &nbs
... Show MoreTraumatic spinal cord injury is a serious neurological disorder. Patients experience a plethora of symptoms that can be attributed to the nerve fiber tracts that are compromised. This includes limb weakness, sensory impairment, and truncal instability, as well as a variety of autonomic abnormalities. This article will discuss how machine learning classification can be used to characterize the initial impairment and subsequent recovery of electromyography signals in an non-human primate model of traumatic spinal cord injury. The ultimate objective is to identify potential treatments for traumatic spinal cord injury. This work focuses specifically on finding a suitable classifier that differentiates between two distinct experimental
... Show MoreEpilepsy is considered as one of the common neurological disorders.About 50 million persons have affected by epilepsy .Carbamazepine is one of the common drugs used by pregnant women with epilepsy. The aim of the present study is to investigate the effect of carbamazepine on the process of brain development during day 13 of pregnancy.Fifty pregnant albino mice have been used. They were divided into two groups. The control group that had been orally drenched with normal saline. The other group was treated group that had been given 15 mgKg of Carbamazepine orally. The fetuses have been collected after killing of the mice. Boun’s solution was selected as fixative. 5-8 µm thick sections from the fetuses were cut to be stained with hematoxyli
... Show MoreThe research aims to find a contemporary model in analyzing the reasons behind the delay of the investment plan projects suffered by the North Oil Company. This model is able to understand the environment surrounding the implementation of projects in the light of the changes facing the company at the present time, which in turn requires the need to identify the most important strengths and weaknesses Internal and external opportunities and threats using the SWOT matrix and identify the appropriate strategic alternative based on clear policy, strategies and programs to address weaknesses and look to the future prospects as the company can be stronger and more flexible environmental changes surrounding the reality of implementation
... Show More