Preferred Language
Articles
/
jbcd-1088
Cephalometric Study of Iraqi Adult Subjects with Cl I and Cl III Skeletal Relationships and Their Effects on Masseter Muscle Thickness by Using Ultrasonography
...Show More Authors

Background: Masseter muscle is one of the most obvious muscles of mastication and considered as one indicator of jaw muscle activity. It has a major influence on the transverse growth of the midface and the vertical growth of the mandible. This study undertaken to determine the role of cephalometric analysis for discrimination between Cl I and Cl III skeletal relationships, determine the role of ultrasonography in determination of masseter muscle thickness, compare masseter muscle thickness between Cl I and Cl III skeletal relationships, and determine the effect of gender on masseter muscle thickness. Material and Method: The sample of the current study consisted of 70 Iraqi subjects 40 males and 30 females with age ranging 18-25 years. They were divided into 2 groups depending on ANB angle: class I skeletal relationship 20 males and 15 females and class III skeletal relationship 20 males and 15 females. The collected sample included patients attended for different diagnostic purposes to the Dental Radiology Department at College of Dentistry/Babylon University, standardized lateral cephalogram was taken to determine facial morphology, six angular and eight linear measurements were assessed. Masseter muscle thickness measured ultrasonography in Al-Hilla General Teaching Hospital/Ultrasonorgaphic Department, in relaxation and contraction conditions for both sides. Results: Various parameters measured for males and females in each class and the comparison shown statistically significant differences between them (P<0.05). No difference in muscle thickness between right and left sides in the same class (P>0.05). Gender variation showed significant difference in masseter muscle thickness during rest and occlusion conditions (P<0.001). Conclusion: Cephalometric analysis served to demonstrate the skeletal morphologies and provide a base for discrimination between class I and class III skeletal relationships. Ultrasonographic scanning is an important imaging procedure. It is reproducible and simple method for accurately measuring masseter muscle thickness. The ultrasonorgaphic study has revealed variations in masseter muscle thickness among individuals with different skeletal morphologies in each gender on one hand and between males and females in each skeletal class on the other hand. Key words: Masseter muscle thickness, skeletal morphology, cephalometric analysis, ultrasonorgaphic scanning.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 13 2026
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the average drag estimated on

... Show More
View Publication
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science &amp; Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 18 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE APPLICITIONS OF JUST IN TIME PRODUCTION AND ITS ROLE ON THE COMPONENTS OF MARKETING INFORMATION SYSTEM: AN APPLIED STUDY IN ALMANSOUR OUR STATE COMPANY FOR CONSTRUCTIONAL CONTRACTS.: THE APPLICITIONS OF JUST IN TIME PRODUCTION AND ITS ROLE ON THE COMPONENTS OF MARKETING INFORMATION SYSTEM: AN APPLIED STUDY IN ALMANSOUR OUR STATE COMPANY FOR CONSTRUCTIONAL CONTRACTS.
...Show More Authors

Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 13 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Estimation of soluble CD14 level in saliva of patients with different periodontal conditions and its correlation with periodontal health status
...Show More Authors

Background: Cluster of differentiation 14 (CD14) is a serum/cell surface glycoprotein; and it is a pattern recognition receptor. CD14 expressed on the surface of various cells, or it found soluble in saliva and other body fluids. It has been proposed that soluble CD14 (sCD14) may play a protective role by controlling Gram negative bacterial infections through its capacity to bind lipopolysaccharide. This study was conducted to assess the level of soluble CD14 in saliva of patients with different periodontal diseases and healthy subjects and determine its correlation with clinical periodontal parameters. Materials & Methods: A total of 80 subjects, age ranged (25-50) years old, divided into three main groups, group ? consisted of 45 chronic

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Machining Polylines and Ellipses using Three-Axis CNC Milling Machine
...Show More Authors

CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.

View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Fusion: Practice And Applications
Enhanced EEG Signal Classification Using Machine Learning and Optimization Algorithm
...Show More Authors

This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref