In this work, oral lesions belong to 17 patients, 7 males and 10 females. Their ages range between 15 and 45 years. Follow up was conducted after one day, 7 days, 14 days, one month, and finally 3 months postoperatively. The study lasted for 1.5 year. Surgical diode laser with wavelength of 810 ± 20 nm, with two power levels of 10 and 15 W were used in contact and in non-contact mode via optical fiber. The postoperative outcome revealed; greater haemostatic capability, dry, sealed wound and noticeable lack in pain sensation
Abstract
There has been a heated controversy over the role the financial policy plays and how sufficient it is in affording the financial burden. This burden is known as the operational current expenses which the governments of various countries mainly afford, despite the discrepancy in the government’s economic policy. After the deterioration and deficit in the state budget in all countries nowadays, it was necessary to find an appropri
... Show Moreبسبب محدودية الموارد الطبيعية، فأن سكان الخليج ومنذ القدم وجهوا جلّ نشاطاتهم توجهاً بحرياً: صيد الاسماك وصناعة اللؤلؤ العنصر الرئيس في حجم التشغيل، وتكوين الفائض الاقتصادي في المنطقة آنذاك.
لقد تزايدت أهمية هذا النشاط بخاصة بعد النصف الثاني من القرن التاسع عشر، لرواج تجارة اللؤلؤ عالمياً، وأنفتاح الخليج على الدول الاوروبية التي شهدت نهضة صناعية متسارعة، وحيث وصلت الخليج العديد من بضائع
... Show MoreThe Research is interested in the detailed comparative study of certain selection of
Imam Alsamarqandi in some subjects of washing and touching the Gracious Quran.
The value of this study is that it is related to one aspect of the duties obliged on Muslim
like parity.
The study has tried to collect certain scholars’ opinions of eight doctrines with the
selection of Alsamarqandi to make a comp arson between them and to show how
Alsamarqandi is able to create legal laws from his sources to lead the researchers nto have
knowledge about the syllabi of the famous scientists.
Finally we ask God to bless to what is right and to accept this study and make it part of
our good deeds, Ameen.
Each Intensity Modulated Radiation Therapy (IMRT) plan needs to be tested and verified before any treatment to check its quality. Octavius 4D-1500 phantom detector is a modern and qualified device for quality assurance procedure. This study aims to compare the common dosimetric criteria 3%/3 mm with 2%/2 mm for H&N plans for the IMRT technique. Twenty-five patients with head and neck (H&N) tumor were with 6MV x-ray photon beam using Monaco 5.1 treatment planning software and exported to Elekta synergy linear accelerator then tested for pretreatment verification study using Octavius 4D-1500 phantom detector. The difference between planned and measured dose were assessed by using local and global gamma index (GI) analysis method at
... Show MoreAbstract
The open budget means everyone in the society can get information about the government budget in order to watch the governmental works. The aim of the research is to study the concepts of open budget, its advantage, limitations, role of supporting the transparency and questioning the administrative and financial corruption. Thus reflects positively on the national economy by providing governmental information to all users whether they are individuals or belong to the political class, or any other governmental or nongovernmental organizations which are interested in these information.
In order to achieve the objectives of the research aims, we make questionnaire to see aca
... Show Moreتعد المحاسبة بشكل عام علماً لكنها ليست من العلوم الصرفة وإنما من العلوم الإجتماعية مما يتطلب للتعامل مع المواضيع المحاسبية الأخذ بنظر الاعتبار الأشخاص المعنيين بالموضوع سواء كانوا المعدين للمخرجات المحاسبية أي المحاسبين، أو الاطراف ذوي المصالح المعنيين والمستفيدين من هذه المخرجات أي المستخدمين، ويعد المحاسب جزءاً من العملية الاجرائية نفسها وبهذا يكون دوره مزدوجاً يجمع بين كونه القائم بالبحث والقي
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreThis study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show More