Background: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the maxilla and mandible were (20) lesions. Statistical analysis of the collected data showed no significant differences between the radiographical records and surgical findings regarding diagnostic accuracy of the lesions. Conclusion: The validity of the CBCT in the assessment of maxillofacial cystic and cystic like lesions was similar to the surgical findings regarding lesion extension, expansion, perforation of buccal/or lingual plates, and relation to the adjacent vital structures
The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.
A simple, rapid, accurate and sensitive spectrophotometric method has been developed for the determing carbamate pesticides in both pure and water samples. The method is appropriate for the determination of carbofuran in the presence of other ingredients that are usually available in dosage forms. The effect of organic solvents on the spectrophotometric properties of the azo dye and the structure of the resulting product have also been worked out and it is found to be 1:1 benzidine :carbofuran. The method can be successfully applied to determination of carbofuran in water samples. The method is based on diazotization of Benzidine (4, 4 – diamino biphenyl) with sodium nitrite and hydrochloric acid followed by coupling with carbofuran
... Show MoreEsculin (ESCN) is used in the pharmaceutical industry with intravenous effect, stimulant and anti-inflammatory capillaries, like vitamin P. It is a significant component of many anti-inflammatory remedies such as esqusan, esflazid and anavenol [14]. It is also found in numerous other remedies available in the market such as proctosone, anustat, and ariproct.
To determine experimental conditions, to elucidate retention behavior of esculin in HILIC mode. Moreover, to suggest new ways to separate and determinate esculin in ointments.
Two hydrophilic c
In this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr
... Show MoreThis study compared the clinicopathological, immunohistochemical characteristics and Epstein-Barr virus (EBV) detection of Burkitt's lymphoma (BL) in the abdomen and jaw of Iraqi patients. A cohort/retrospective study was carried out between August and September 2024 using 25 tissue blocks (14 gnathic and 11 abdominal BL) from the Oral and Maxillofacial Laboratory, University of Baghdad, College of Dentistry, and the National Centre for Educational Laboratories. The sections were stained with haematoxylin and eosin (H&E), while CD10, CD20, Bcl-2, BCl-6, C-Myc and Ki-67 markers were used for diagnosis. The DNA detection of the EBV was performed by polymerase chain reaction (PCR). The tumours showed 22 classical and 3 atypical histologi
... Show MoreA two-dimensional computational study had been performed regarding aerodynamic forces and pressures affecting a cambered inverted airfoil, CLARK-Y smoothed with ground effects by solving the Reynolds-averaged Navier-Stokes equations, using the commercial software COMSOL Multiphysics 5.0 solver. Turbulence effects are modeled using the Menter shear-stress transport (SST) two-equation model. The negative lift (down-force), drag forces and pressures surface were predicted through the simulation of wings over inverted wings in different parameters namely; varying incidences i.e. angles of attack of the airfoils, varying the ride hide from the ground covering various force regions, two-dimensional cross-section of the inverted front wings to be
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More