Background: The prediction of changes in the mandibular third molar position and eruption is an important clinical concern because third molar retention may be beneficial for orthodontic anchorage. The aims of this study were to assess the mandibular third molar position by using medical CT scan and lateral reconstructed radiograph and evaluate gender differences. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years who were attending at Al-Suwayra General Hospital/ the Computerized Tomography department. The distance from anterior edge of ramus to distal surface of permanent mandibular second molar and mesio-distal width of developing mandibular third molar were measured in both three dimensional volumetric and two dimensional CT derived lateral images. The statistical analyses included: means, standard deviations. Paired t-test was used to compare between the two methods and independent t-test was used in verifying the genders difference. Results: The results showed that there was high significant method difference between 3D CT and 2D image and gender differences were observed in values of linear measurements of present study, as males showed higher mean values than females. Conclusion: There is high accuracy of measurement on CT images, so C.T. scan is advisable during the diagnosis and treatment plan of orthodontic cases.
The discovery of novel therapeutic molecules is always difficult, and there are a variety of methodologies that use the most diverse and innovative medicinal chemistry approaches. One such approach is the deuteration technique: Deuteration is the process of substituting deuterium for hydrogen in a molecule. When compared to the drug molecule, its deuterated analogues may retain the features of the original molecule and, in some cases, improve its pharmacological activity, with fewer side effects and lower toxicity. Metronidazole is a commonly used antibiotic to treat anaerobic bacterial infections, protozoal and microaerophilic bacterial infections. Met
... Show MoreBackground: The Titanium and its alloys are suitable for dental implant and medical applications. Biocompatibility of the materials is a major factor in determining the success of the implant and has a great impact on their rate of osseointegration. The aim of this study was to evaluate the biocompatibility and cytotoxicity of Ti2AlC in comparison to CPTi & Ti6Al7Nb in rabbits. Materials and Methods: 10 male New Zealand White rabbits, weighing (2-2.5 kg), aged (10-12 months) were used in this study. Cylindrical implants were prepared from the study materials (CPTi, Ti6Al7Nb and Ti2AlC) with (8mm) height and (3mm) diameter for the evaluation of tissue response and disc specimens were prepared with (6 mm) diameter and (2 mm) thickness for ev
... Show MoreBackground: Bone regeneration in dehiscence and fenestration defect can be improved with the use of platelet rich fibrin (PRF) that provides a scaffold for new bone regeneration. This study was conducted to assess the effectiveness of PRF as a graft material and membrane in dehiscence and fenestration defects. Materials and Methods: This prospective clinical study included patients who received dental implants that demonstrated peri-implant defects which were augmented using Leukocyte- PRF (L-PRF) or Advanced-PRF (A-PRF). Twenty four weeks postoperatively the defect resolution and the density of regenerated bone were assessed by CBCT and re-entry surgery. The assessment also included measurement of primary and secondary implant stability
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreAn efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreThis paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreIn this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.