Background: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the maxilla and mandible were (20) lesions. Statistical analysis of the collected data showed no significant differences between the radiographical records and surgical findings regarding diagnostic accuracy of the lesions. Conclusion: The validity of the CBCT in the assessment of maxillofacial cystic and cystic like lesions was similar to the surgical findings regarding lesion extension, expansion, perforation of buccal/or lingual plates, and relation to the adjacent vital structures
The control of water represents the safe key for fair and optimal use to protect water resources due to human activities, including untreated wastewater, which is considered a carrier of a large number of antibiotic-resistant bacterial species. This study aimed to investigate the prevalence of antibiotic-resistance to E. coli in Tigris River by the presence of resistance genes for aminoglycoside(qepA( ,quinolone (gyrA), and sulfa drugs( dfr1 ,dfr17) due to the frequent use of antibiotics and their release into wastewater of hospitals. Samples were collected from three sites on Tigris River: S1( station wastewater in Adhamiya), S2 (station wastewater in Baghdad Medical city hospital), S3 (station wastew
... Show MoreThe paper aims at initiating and exploring the concept of extended metric known as the Strong Altering JS-metric, a stronger version of the Altering JS-metric. The interrelation of Strong Altering JS-metric with the b-metric and dislocated metric has been analyzed and some examples have been provided. Certain theorems on fixed points for expansive self-mappings in the setting of complete Strong Altering JS-metric space have also been discussed.
|
In this work, an experimental investigation has been done for heat transfer by natural-convection through a horizontal concentric annulus with porous media effects. The porous structure in gap spacing consists of a glass balls and replaced by plastic (PVC) balls with different sizes. The outer surface of outer tube is isothermally cooled while the outer surface of inner tube is heated with constant heat flux condition. The inner tube is heated with different supplied electrical power levels. Four different radius ratios of annulus are used. The effects of porous media material, particles size and annulus radius ratio on heat dissipation in terms of average Nusselt number have been analyzed. |
We demonstrate that the selective hydrogenation of acetylene depends on energy profile of the partial and full hydrogenation routes and the thermodynamic stability of adsorbed C2H2 in comparison to C2H4.
ABSTRACT
The research aims to analyze the value chain of dairy products in Iraq (Abu Ghraib/Study Case) factories for the year 2022, where value chain rings are identified to discuss and track the most important determinants and problems in the value chain rings of dairy products and their basic and secondary activities, as well as calculate the value added of the products by subtracting the total revenues of products from their variable costs. Research data were collected for the period 2022. Preliminary information and data from its field sources and personal interviews were collected through a questionnaire prepa
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.