Abstract: Residual ridge resorption is chronic, progressive, irreversible and cumulative condition associated with teeth loss. Management of a residual ridge with severe resorption to fulfill the patient’s esthetic and functional requirements is quite difficult for the practitioner and also in the construction of an acceptable appliance. As the height of the edentulous ridge reduces the mandibular denture will be improperly function. Severe resorption of the mandibular alveolar ridge may cause instability and discomfort of the convention acrylic resin denture. Dealing with this condition requires clinical skills and knowledge. Treating the severely resorbed mandibular ridge is a challenging effort for prosthodontics. This research presents a case report on neutral zone impression technique used for treating a completely edentulous patient with resorbed ridges, in addition to using four dental implants in order to get the benefits of both occlusal harmony from the neutral zone which located the teeth in it and the support, retention from implants in bone. The use of combination of a neutral zone impression technique and the implant supported over denture for the treatment of severely resorbed mandibular ridge result in patient satisfied with the enhancement in denture retention, stability, and support.
Prosthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreIn Baghdad city, Iraq, the traffic volumes have rapidly grown during the last 15 years. Road networks need to reevaluate and decide if they are operating properly or not regarding the increase in the number of vehicles. Al-Jadriyah intersection (a four-leg signalized intersection) and Kamal Junblat Square (a multi-lane roundabout), which are two important intersections in Baghdad city with high traffic volumes, were selected to be reevaluated by the SIDRA package in this research. Traffic volume and vehicle movement data were abstracted from videotapes by the Smart Traffic Analyzer (STA) Software. The performance measures include delay and LOS. The analysis results by SIDRA Intersection 8.0.1 show that the performance of the roundab
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThis study investigated a novel application of forward osmosis (FO) for oilfield produced water treatment from the East Baghdad oilfield affiliated to the Midland Oil Company (Iraq). FO is a part of a zero liquid discharge system that consists of oil skimming, coagulation/flocculation, forward osmosis, and crystallization. Treatment of oilfield produced water requires systems that use a sustainable driving force to treat high-ionic-strength wastewater and have the ability to separate a wide range of contaminants. The laboratory-scale system was used to evaluate the performance of a cellulose triacetate hollow fiber CTA-HF membrane for the FO process. In this work, sodium chloride solution was used as a feed solution (FS) with a concentratio
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThis research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor
Summary
The subject ( meaning of added verbs) is one of the main subjects
which study in morphology since in Arabic language. It is include the meaning
of each format, and the increased meaning occurred by this increment in the
verbs.
The (strain) is one of very important meaning in this subject, it takes a
wide area of morphology studies, and interesting of scientists and
researchists.
There are two famous formats for this meaning; (infa la انفع
ل ), and (ifta
la افتع
ل ). Also There are another formats for the same meaning, but less than
the first two in use, they are; (taf ala تفعّ
ل ), (tafa ala تفاع
ل ), (taf lala ) ,(تفعل
ل
ifanlala افعنلل ), (ifanla .(