Background: Mini implant stability is primarily related to local bone density; no studies have evaluated bone density related to mini implant placement for orthodontic anchorage between different age groups in the maxilla and the mandible. The present research aims to evaluate side, gender, age, and regional differences in bone density of the alveolar bone at various orthodontic implant sites. Materials and method: Fifty three individuals who were divided into two groups according to their age into: group I (ages 16-20 years) and group II (ages 21-29 years) had subjected to clinical examination, then 64-multislice computed tomography scan data were evaluated and bone density was measured in Hounsfield unit at 102 points (51 in the maxilla and 51 in the mandible), and mean alveolar bone density was calculated at each site in the CT axial plane. Results: No significant differences in bone density between the sides and gender were found. Generally, the bone density measurements of group I and II were not statistically different at almost most sites. The mean bone density of the alveolar cortical bone was greater in the mandible than in the maxilla and showed a progressive increase from the anterior to the posterior area, while in the maxilla the highest bone density was at the premolars region. The maxillary tuberosity was the region with lowest bone density. Cancellous bone had almost comparable densities between the mandible and the maxilla and its density was less than those of cortical sites. Conclusion: When mini implants are indicated, no gender and side differences affect the success rate regarding bone density; while age and area should be considered when selecting and placing mini implants for orthodontic anchorage.
The importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research ob
... Show MoreTests were performed on asphalt concrete specimens with (101.6 mm in diameter and 101.6 mm in height), and the results were implemented for calculating permanent deformation and resilient modulus under repeated compressive stress with different levels of stresses (0.068, 0.138 and 0.206) MPa at 40 ºC. Two types of additives namely (carbon black-asphalt) and (SBR-asphalt) were tried as rejuvenators with three percentages of (0.5, 1 and 1.5) % by weight of asphalt cement along with two ratios of AC (1 and 2) % have been implemented as rejuvenator and blended with the reclaimed asphalt concrete. Aged materials were obtained from the site. 100% Reclaimed Asphalt Pavement material from the reclaimed mixture is implemented. A
... Show MoreQuality is one of the important criteria to determine the success of product. So quality control is required for all stages of production to ensure a good final product with lowest possible losses. Control charts are the most important means used to monitor the quality and its accuracy is measured by quickly detecting unusual changes in the quality to maintain the product and reduce the costs and losses that may result from the defective items. There are different types of quality control charts and new types appeases involving the concept of fuzziness named multinomial fuzzy quality control chart (FM) , dividing the product to accepted and not may not be accurate therefore adding fuzziness concept to quality charts confirm and a
... Show MoreOur goal in this research, some new nucleoside analogues was synthesized. Starting from ?-D glucose which was converted to per acetylated ?-D gluco pyronoside then converted to active from(1-Bromo Sugar (2) as a sugar moiety.The base moiety 2-substituted benzimidazole was prepared from condensation of phenylene diamine with different aromatic aldehydes, which were subjected to amino alkylation via Mannich reaction forming new nucleobase derivatives. Condensation of nucleobase with bromo sugar through nucleophilic substitution of anomeric carbon with nitrogen forming new protected nucleoside analogues then hydrolyzed with sodium methoxide in methanol to obtain our target, the free nucleoside analogues. All prepared compound were identified b
... Show MoreThirty five samples were collected from patients (1-30) years old, suffered from, infected skin , rushes, boils , oral thrush, anal & vaginal itches. Candida albicans 57.3% (20 isolates) and Candida tropicalis 22.5% (8 isolates) Aspergillus fumegatus 11.5% (4 isolates) Aspergillus nigar 8.7%(3 isolates) , were isolated & identified from these samples. Alcoholic & water hot extracts of the punica granatum (Pomegranate) peels as well as the dried powder were prepared. The anti-fungal activity of the extracts was evaluated by means of the agar-well diffusion assay. The extract exhibited potent activity against yeast. The Minimum inhibitory concentra
... Show MoreThe control charts are one of the scientific technical statistics tools that will be used to control of production and always contained from three lines central line and upper, lower lines to control quality of production and represents set of numbers so finally the operating productivity under control or nor than depending on the actual observations. Some times to calculating the control charts are not accurate and not confirming, therefore the Fuzzy Control Charts are using instead of Process Control Charts so this method is more sensitive, accurate and economically for assisting decision maker to control the operation system as early time. In this project will be used set data fr
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreIn this work, polyvinylpyrrolidone (PVP), Multi-walled carbon nanotubes (MWCNTs) nanocomposite was prepared and hybrid with Graphene (Gr) by casting method. The morphological and optical properties were investigated. Fourier Transformer-Infrared (FT-IR) indicates the presence of primary distinctive peaks belonging to vibration groups that describe the prepared samples. Scanning Electron Microscopy (SEM) images showed a uniform dispersion of graphene within the PVP-MWCNT nanocomposite. The results of the optical study show decrease in the energy gap with increasing MWCNT and graphene concentration. The absorption coefficient spectra indicate the presence of two absorption peaks at 282 and 287 nm attributed to the π-π* electronic tr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More