Background: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (one implant in the study group failed so it was excluded from the statistical analysis) were randomized into two groups: control group which involved 20 implants inserted by conventional flapped surgical approach and study group which involved 20 implants inserted by flapless surgical approach. Estimation of alveolar bone was done for study group by bone (ridge) mapping procedure. Duration of surgical operation for each implant, Implant stability was measured at three time intervals (at surgery, two months and three months after surgery). Results: After three months interval of surgery the mean implant stability of the study (flapless) group achieved significant higher implant stability than control (flapped) group (P< 0.05) and the difference in measured implant stability was (5.05) implant stability quotient(ISQ). The time of surgical operation for implants in the study group significantly was less than that of control group (P< 0.01). Conclusions:implants placed with flapless surgical technique can produce high implant stability in shorter time and consume prominently shorter time for surgical operation compared to those placed with conventional flapped technique.
The research location is the northern part of the Basin of Limboto Lake; the focus of the research is the limestone outcrop with 24 meter thickness in Yosonegoro area. The purpose of the study is to find out facies, standard microfacies and depositional environment on Limboto limestone. The research method carried out consisted of three methods namely the measured section, petrographic analysis and biostratigraphy analysis.
The limestone facies in the Yosonegoro area consist of two facies. Then, based on sedimentary structure, composition, color, precipitation texture, terrestrial origin components and the organism content, the two facies can divided into three different microfacies. Paleobathyme
... Show MoreThe research aims to identify the possibility of applying environmental fines to commercial shops and restaurants to reduce the environmental pollution represented by the wastes generated from them. The research sample was divided into two groups, including the first (20) commercial shops (meat shops and slaughter it, fruits & vegetables, legumes and accessories) and second (30) Restaurant in the city of Baghdad on both sides of Karkh and Rusafa. The quality of the waste was classified into carton, plastic, aluminum, glass, paper, cork and food waste. The study revealed the possibility of applying environmental fines to restaurants and shops to reduce the waste generated from them throughout the year and to apply continuous monitorin
... Show MoreEvidences indicate that human beings were preoccupied with extreme forms of mental and psychic experiences long before they were recorded in literature. Greek myths and legends appear to include symbolizations of delusions, mania, and other bizarre forms of thought and behaviuor. The figure of the mad man or woman is analogous to the wild man, or the imaginary being who appears in various forms throughout western literature and art. Various studies refer to the notion of the wild man as a response to a persistent psychological urge. This urge gives an external expression and a valid form to the impulses of reckless physical self-assertion which is believed to be hidden in all of us, but is normally kept under control. Such impulses were exp
... Show MoreThe methods used by the print media (press) is varied in conveying its messages and its orientations to the readers. But language takes the leading method among these methods, or a real competitor - so far - due to the characteristics and advantages of languages, including: ease, abbreviation, and development, etc.
In the midst of such events, political tensions, and what they carry of the global developments, and among which was the most important the fall of the former Iraqi regime in the spring of 2003, the press had the greatest share, and a large portion on the level of monitoring, analyzing, and interpreting the various consequences of the event. The interpreting of the news varies according to the evolving political trends
... Show MoreBurn is one of the most devastating traumas that someone can encounter in their life. Burn wound sepsis is still the leading cause of death in burned patients. Appropriate knowledge of the causative pathogen in burn sepsis is important for successful patient management and for the reduction of the incidence of antibiotic resistance. A retrospective study was conducted between 2010 and 2018 at the Burn Specialty Hospital in Baghdad.Atotal of 320 blood culture samples were obtained from patients with sepsis orsuspected of having sepsis. Patient age ranged between 9 months to 70 years old, with a mean total burn surface area of 45.26%. The most common microorganisms isolated from those patients who had sepsis or suspicion of sepsis were Klebsi
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More