Background: Masseter muscle is one of the most obvious muscles of mastication and considered as one indicator of jaw muscle activity. It has a major influence on the transverse growth of the midface and the vertical growth of the mandible. This study undertaken to determine the role of cephalometric analysis for discrimination between Cl I and Cl III skeletal relationships, determine the role of ultrasonography in determination of masseter muscle thickness, compare masseter muscle thickness between Cl I and Cl III skeletal relationships, and determine the effect of gender on masseter muscle thickness. Material and Method: The sample of the current study consisted of 70 Iraqi subjects 40 males and 30 females with age ranging 18-25 years. They were divided into 2 groups depending on ANB angle: class I skeletal relationship 20 males and 15 females and class III skeletal relationship 20 males and 15 females. The collected sample included patients attended for different diagnostic purposes to the Dental Radiology Department at College of Dentistry/Babylon University, standardized lateral cephalogram was taken to determine facial morphology, six angular and eight linear measurements were assessed. Masseter muscle thickness measured ultrasonography in Al-Hilla General Teaching Hospital/Ultrasonorgaphic Department, in relaxation and contraction conditions for both sides. Results: Various parameters measured for males and females in each class and the comparison shown statistically significant differences between them (P<0.05). No difference in muscle thickness between right and left sides in the same class (P>0.05). Gender variation showed significant difference in masseter muscle thickness during rest and occlusion conditions (P<0.001). Conclusion: Cephalometric analysis served to demonstrate the skeletal morphologies and provide a base for discrimination between class I and class III skeletal relationships. Ultrasonographic scanning is an important imaging procedure. It is reproducible and simple method for accurately measuring masseter muscle thickness. The ultrasonorgaphic study has revealed variations in masseter muscle thickness among individuals with different skeletal morphologies in each gender on one hand and between males and females in each skeletal class on the other hand. Key words: Masseter muscle thickness, skeletal morphology, cephalometric analysis, ultrasonorgaphic scanning.
An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreLive the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.
... Show MoreBackground: Cluster of differentiation 14 (CD14) is a serum/cell surface glycoprotein; and it is a pattern recognition receptor. CD14 expressed on the surface of various cells, or it found soluble in saliva and other body fluids. It has been proposed that soluble CD14 (sCD14) may play a protective role by controlling Gram negative bacterial infections through its capacity to bind lipopolysaccharide. This study was conducted to assess the level of soluble CD14 in saliva of patients with different periodontal diseases and healthy subjects and determine its correlation with clinical periodontal parameters. Materials & Methods: A total of 80 subjects, age ranged (25-50) years old, divided into three main groups, group ? consisted of 45 chronic
... Show MoreCNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance
... Show More