Background: The prediction of changes in the mandibular third molar position and eruption is an important clinical concern because third molar retention may be beneficial for orthodontic anchorage. The aims of this study were to assess the mandibular third molar position by using medical CT scan and lateral reconstructed radiograph and evaluate gender differences. Materials and Methods: The sample of present study consisted of 39 patients (18 males and 21 females) with age range 11-15 years who were attending at Al-Suwayra General Hospital/ the Computerized Tomography department. The distance from anterior edge of ramus to distal surface of permanent mandibular second molar and mesio-distal width of developing mandibular third molar were measured in both three dimensional volumetric and two dimensional CT derived lateral images. The statistical analyses included: means, standard deviations. Paired t-test was used to compare between the two methods and independent t-test was used in verifying the genders difference. Results: The results showed that there was high significant method difference between 3D CT and 2D image and gender differences were observed in values of linear measurements of present study, as males showed higher mean values than females. Conclusion: There is high accuracy of measurement on CT images, so C.T. scan is advisable during the diagnosis and treatment plan of orthodontic cases.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
This study investigated the treatment of dairy wastewater using the electrocoagulation method with iron filings as electrodes. The study dealt with real samples collected from local factory for dairy products in Baghdad. The Response Surface Methodology (RSM) was used to optimize five experimental variables at six levels for each variable, for estimating chemical oxygen demand (COD) removal efficiency. These variables were the distance between electrodes, detention time, dosage of NaCl as electrolyte, initial COD concentration, and current density. RSM was investigated the direct and complex interaction effects between parameters to estimate the optimum values. The respective optimum value was 1 cm for the distance between electrodes, (6
... Show Morehe assignment model represents a mathematical model that aims at expressing an important problem facing enterprises and companies in the public and private sectors, which are characterized by ensuring their activities, in order to take the appropriate decision to get the best allocation of tasks for machines or jobs or workers on the machines that he owns in order to increase profits or reduce costs and time As this model is called multi-objective assignment because it takes into account the factors of time and cost together and hence we have two goals for the assignment problem, so it is not possible to solve by the usual methods and has been resorted to the use of multiple programming The objectives were to solve the problem of
... Show MoreThe inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreHigh performance self-consolidating concrete HP-SCC is one of the most complex types of concrete which have the capacity to consolidated under its own weight, have excellent homogeneity and high durability. This study aims to focus on the possibility of using industrial by-products like Silica fumes SF in the preparation of HP-SCC enhanced with discrete steel fibers (DSF) and monofilament polypropylene fibers (PPF). From experimental results, it was found that using DSF with volume fraction of 0.50 %; a highly improvements were gained in the mechanical properties of HP-SCC. The compressive strength, splitting tensile strength, flexural strength and elastic modulus improved about 65.7 %, 70.5 %, 41.7 % and 80.3 % at 28 days age, respectively
... Show MoreDrilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.
Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.
This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.
The experim
... Show MoreIn this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThis paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show More