Abstract: Thorough assessment of the Maxillary,Sinus is very important. Recently 3-dimensional imagewith Cone Beam Computed Tomography (CBCT) is very dependable in Maxillary Sinus diagnosis. The aim of this study is to: shade light on the role of (CBCT) diagnosis of the maxillary sinus anatomical variation and pathological finding among smokers and nonsmokers prior to maxillary sinus lift techniques. Materials and Method: In this study 60 males with age ranged between 20-50 years old, referred for (CBCT) assessment of maxillary sinus in the Specialist Health Center of AL-Sadder city. The scanning were performed using Kodak 9500 (CBCT), the KV was 90, mA10 and scanning time 10 s. Voxel size 0.3mm with( DICOM ) software on a multiplaner reconstruction window in which the axial, coronal and sagittal plane could be visualized in 0.3 mm interval, 40 were smokers and 20 nonsmokers, both sides were evaluated to assess the presence of septa, maxillary sinus membrane (Schneiderian membrane)thickening, complete opacification and adenoid polyp. Result:The maxillary for nonsmoker patients (20) patients were clean and have no any pathological or anatomical changes, among smoker patients, it was found that 7 (17.5%) of them had a clean maxillary sinus, 25 (62.5%) patient from smokers, the mucosal thickening was clear and measured more than 4 mm, 20 (80%) of them bilateral maxillary sinus were involved and 5 (20%) of them have a unilateral thickening, 6 (15%) of the smoker patient have bilateral involved adenoid with max sinus, and 2(5%) of them have full opacification., no septa was found in this study. Conclusion:Cone Beam Computed Tomography(CBCT)was themost useful technique to diagnose maxillary sinusbefore maxillary sinus augmentation, an evaluation ofCone Beam Computed Tomography(CBCT)scans before implant surgery or sinus augmentation procedures has extreme clinical importance in evaluation of anatomic structures, such as thickening of the Schneiderian membrane and presence of pathological lesion such as adenoid polyp. Key words: Cone beam computed tomography, maxillary sinus, anatomical variations.
To study the comparative use of some soil minerals (zeolite, bentonite, phosphate rock, and limestone) in the adsorption and release of lead and its removal rates from its aqueous solutions using adsorption equations. Two laboratory experiments were carried out for the adsorption and release of lead. The adsorption experiment took 0.5 g of some of the above soil minerals. Lead was added as Pb (NO3)2 at levels of 3.0, 2.0, 1.5, 1.0, 0.5, and 0.0 mmol L-1 containing a concentration of 0.01M of calcium chloride. The experimental unit’s number was 72, the concentration of dissolved lead in the equilibrium solution was estimated and the amount of lead adsorbed was calculated. As for the lead release experiment, samples fo
... Show MoreThis experiment examined the effects of adding sodium alginate and Kojic acid as substitutes for conventional antibiotics to Skim milk extender on the characteristics of cryopreserved and frozen buffalo bull semen, as well as the evaluation of their additions as antibiotics that help lower the microbial load. Following the collection and dilution of the Skim milk extender, the experimental treatments were separated into five groups, as follows: T1: (control-) without adding any antibiotics; T2: (control+) adding the conventional antibiotics Gentamicin 0.4 IU and Tylosin 0.08 IU per 100 ml; T3: adding Kojic acid at (0.06 g/L) T4: adding sodium alginate at (0.6 mg/mL)T5: adding a combin
The study aimed to prepare psychological measures of intellectual emptiness and mental distraction on university students. The two researchers used the descriptive approach in the two methods of surveying and correlational relations to suit the nature of the research, where the study sample consisted of (101) students of physical education and sports sciences. The phrase- Intellectual emptiness(35) and (34) is a phrase for mental distraction and presented it to experts in psychology, testing and measurement, and the statistical bag for social sciences (spss) was used, and the results of the research showed that intellectual emptiness has a moral relationship with straying among some students of the College of Physical Education
... Show MoreSevere periodontitis is ranked as the sixth most prevalent disease affecting humankind, with an estimated 740 million people affected worldwide. The diagnosis of periodontal diseases mainly relies upon assessment of conventional clinical parameters. However, these parameters reflect past, rather than current, clinical status or future disease progression and, likely, outcome of periodontal treatment. Specific and sensitive biomarkers for periodontal diseases have been examined widely to address these issues and some biomarkers have been translated as point-of-care (PoC) tests. The aim of this review was to provide an update on PoC tests for use in the diagnosis and management of periodontal diseases. Among the PoC tests developed so
... Show MoreBackground: Bowel cancer is the most prevalent digestive system cancer and is the 4th largest cause of cancer-related death worldwide. In Iraq, colon and rectal cancer (CRC) is the 6th most common malignancy in males and the 5th in females. This cancer is sluggish in growth, which gives a window of opportunity to screen for both precursor lesions and early cancer. The Cluster of Differentiation 47 (CD47) protein is a type of transmembrane glycoproteins found on nearly all human cells, including non-hematopoietic and hematopoietic cells. CD47 promotes CRC growth by triggering angiogenesis and apoptosis of tumor cell. Objectives: To evaluate the immunohistochemical expression of (CD47) in various colorectal samples from Iraqi patients
... Show MoreDust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed
... Show More|
Building Information Modeling (BIM) is becoming a great known established collaboration process in Architecture, Engineering, and Construction (AEC) industry. In various cases in many countries, potential benefits and competitive advantages have been reported. However, despite the potentials and benefits of BIM technologies, it is not applied in the construction sector in Iraq just like many other countries of the world. The purpose of this research is to understand the uses and benefits of BIM for construction projects in Iraq. This purpose has been done by establishing a fr |
Objectives: The main objective of this study is to examine the crucial role that Russian writers and intellectuals played in catalyzing the 1905 Revolution in Russia. Specifically, the study sought to analyze how their literary works, philosophical ideas, and political writings challenged Tsarist autocracy, depicted the suffering of the masses, and inspired opposition movements. The study aimed to highlight the defiant writings that contributed to the rise of political figures and the eventual overthrow of the repressive regime. Methods: The historical narrative and analytical methods were employed, conducting a comparative analysis of prominent works by renowned authors such as Tolstoy, Gorky, and Chekhov. This analysis focused on
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More