Abstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the nose. The prosthesis was made to restore the aesthetic appearance of the patient with a mechanical retained design using rapid prototyping technology. Rapid prototyping using 3D printing technology of maxillofacial prosthesis is useful technique in reducing time and increasing the quality of the final product while, conventional procedures have to depend on the patient's siblings or close relatives or prefabricated casts along with photographs which may not be available at all times. Computer-Aided Design offers limitless shapes and sizes of digitized nose that can be checked virtually on the patient's digitized face. Although it may seem to be costly in terms of money, it does reduce patient's number of visits and chairside time.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
The Electro-Fenton oxidation process is one of the essential advanced electrochemical oxidation processes used to treat Phenol and its derivatives in wastewater. The Electro-Fenton oxidation process was carried out at an ambient temperature at different current density (2, 4, 6, 8 mA/cm2) for up to 6 h. Sodium Sulfate at a concentration of 0.05M was used as a supporting electrolyte, and 0.4 mM of Ferrous ion concentration (Fe2+) was used as a catalyst. The electrolyte cell consists of graphite modified by an electrodepositing layer of PbO2 on its surface as anode and carbon fiber modified with Graphene as a cathode. The results indicated that Phenol concentration decreases with an increase in current dens
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreKE Sharquie, AA Noaimi, SA Galib, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
The removal of fluoride ions from aqueous solution onto algal biomass as biosorbent in batch and continuous fluidized bed systems was studied. Batch system was used to study the effects of process parameters such as, pH (2-3.5), influent fluoride ions concentration (10- 50 mg/l), algal biomass dose (0–1.5 g/ 200 ml solution), to determine the best operating conditions. These conditions were pH=2.5, influent fluoride ions concentration= 10 mg/l, and algal biomass dose=3.5 mg/l. While, in continuous fluidized bed system, different operating conditions were used; flow rate (0.667- 0.800 l/min), bed depth (8-15 cm) corresponded to bed weight of (80- 150 g). The results show that the breakthrough time increases with the inc
... Show More