Background: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the maxilla and mandible were (20) lesions. Statistical analysis of the collected data showed no significant differences between the radiographical records and surgical findings regarding diagnostic accuracy of the lesions. Conclusion: The validity of the CBCT in the assessment of maxillofacial cystic and cystic like lesions was similar to the surgical findings regarding lesion extension, expansion, perforation of buccal/or lingual plates, and relation to the adjacent vital structures
This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.
Encasing glass fiber reinforced polymer (GFRP) beam with reinforced concrete (RC) improves stability, prevents buckling of the web, and enhances the fire resistance efficiency. This paper provides experimental and numerical investigations on the flexural performance of RC specimens composite with encased pultruded GFRP I-sections. The effect of using shear studs to improve the composite interaction between the GFRP beam and concrete was explored. Three specimens were tested under three-point loading. The deformations, strains in the GFRP beams, and slippages between the GFRP beams and concrete were recorded. The embedded GFRP beam enhanced the peak loads by 65% and 51% for the composite specimens with and without shear connectors,
... Show MoreIn this research, the influence of the fermentation treatments and baking in Iraqi’s flour type (Ibaa 99, Al-rashed, Tamus, Abu-grabe) and Turkish flour type (Muaamel) on phytic acid was investigated. In whole wheat flour, the phytic acid was (1500, 1290, 1450, 1230, 1440 ( mg/ 100 g flour respectively, and the inorganic phosphorous was (29.18, 25.15, 23.89, 20.85, 22.83) mg/100 g flour respectively. The dough prepared from flour with a higher phytic acid content also contained higher amount of phytic acid. During fermentation, degradation of phytic acid occurred. The cumulative loss of phytic acid after fermentation in all type of dough was ~ 23, 22, 34, 26 and 27% respectively،While increased of inorganic phosphorous occurred. The c
... Show MoreEugenol is found in essential oils of many plants. It belongs to a class of naturally occurring phenolic monoterpenoids, chemically it is an allyl chain-substituted guaiacol. A study was conducted on the compound of Eugenol, which included different studies. The first study was the determination of eugenol in body fluid, which includes serum, saliva and urine has been found the highest concentration was in urine then serum and saliva. The second study was the hematological study. Complete blood count was accomplished on the volunteers alredy administrated with eugenol contained mouthwash the analysis was accomplished before and after the mouth wash use. The result observed a slightly negative results and was not that significant, wh
... Show MoreThe experiment was carried out in the green house of botanical garden belong to Department of Biology/College of Education for Pure Science- Ibn–al- Haitham/University of Baghdad, for the growth season 2015 using plastic pots. The experiment aimed to study the effect of two concentrations of sodium chloride (50, 100) mM.L-1 in addition to the control and four concentrations of kinetin (25, 50, 75, 100) mg.L-1 in addition to the control and the influence of application and non application of fertilizlizer NPKZn in the level 160 kg.h1- and their interactions on some growth parameters (fresh weight for both root and vegetative part, dry weight for leaves , value of secondary productivity, biomass duration for vegetative part and dry weight f
... Show MoreThe effect of nitrogen fertilizer and the planting distance on growth and yield of the sunflower cultivar (Taka) was investigated. The experiment was conducted in the field using five nitrogen fertilizer levels (0, 50, 100, 150, 200) kg/donum and three planting distances (10, 20, 30) cm/plant. The experiment design was split-plot by using RCBD with four replicates. The level of fertilizer as the main plot, while the planting distance as the sub plot. Plant high and yield components were measured. Results indicated that using 200 kg/donum of nitrogen and 30 cm/plant of planting distance gave the highest rate of 1000 seeds weight and the number of seeds/ head. While using 200 kg/donum of nitrogen fertilizer with 10 cm/plant of planting dista
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show More