Background: Asymmetry assessment is an important component of orthodontic diagnosis and treatment planning. Several studies attempted to find the relationship between craniometric asymmetry and skeletal jaws relationship and many authors found some extent of asymmetry in individuals with normal jaws relationship. The use of Computed tomography (CT) allows for the assessment of asymmetry on a dimensionally accurate volumetric image, aim of the study is to determine if there are differences in craniometric asymmetry between patient with skeletal class I and patients with skeletal class II relationship using Helical CT scan. Materials and Methods: Ninety individuals with clinically symmetrical faces were imaged with Helical CT scan, and aging 18-35 years, divided into two groups, class ? group consisted of 31 individuals and class ?? group consisted of 59individuals. Anatomical landmarks were defined and reference planes were established to determine the variance of the landmarks using a coordinate plane system. Sagittal radiographs were used to determine the amount of the ANB angle. Asymmetry was analyzed by calculating the linear measurements and asymmetry indices of the anatomical landmarks by using coronal and axial radiographs in both classes. Results: Clinically symmetrical faces demonstrated a computed tomographic significant asymmetry with the vertical dimensions being significantly larger than the bilateral dimensions and the amount of asymmetry was more at the level of the mandible and less at the maxillary area. Conclusions: The craniometric structures in terms of size and shape were larger in males than in females. The amount of asymmetry was independent on gender and skeletal jaws relationship and age.
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show MoreThe green production of iron oxide nanoparticles (FeONPs) due to its numerous biotechnological uses has attracted a lot of attention and clean and eco-friendly approaches in the medical field.
The objectives of this study are to demonstrate the biogenic creation of FeONPs. The search for alternative antimicrobial medicines has been prompted by growing worries about multidrug resistance.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThis paper investigated the fatigue life behavior of two composite materials subjected to different times of shot peening (2, 4 and 6 min).The first material prepared from unsaturated polyester with E-glass reinforcement by 33% volume fraction. While, the second one was prepared from unsaturated polyester with aluminum powder by2.5% volume fraction. The experimental results showed that the improvement in endurance limit was obtained (for the first material) at 2, 4 and 6 min shot peening times where the percentage of maximum improvement was 25% at shot peening time of 6 min. While, the endurance limit of the second material decreased at shot peening times of 2, 4 and 6 min where the percentage of maximum reduction was 29 % at shot peenin
... Show MoreProstate cancer (PC), accounts for more than one-fourth of all cancer diagnoses, and the most frequently diagnosed cancer among men in 2022. The immunoglobulin (IG) Program death ligand-1(PD-1) cell surface receptor is predominantly expressed on the surface of many cells. The purpose of this study was to demonstrate the relationship between Program death ligand expression and some aggressive features of prostate cancer including perineural invasion, vascular invasion and necrosis. Thirty cases of prostate cancer with age range from 60 to 80 year old and 30 cases of normal prostate tissue with age under 25 year old were separated into two groups in a retrospective case-control
... Show MoreBackground: Due to the variations in tooth anatomy and size among different populations, this study aimed to compare the mesiodistal width of primary second molars in Iraqi children with the mesiodistal width of stainless-steel crowns from different companies. Materials and Methods: This cross-sectional study was conducted on 220 intact maxillary and mandibular primary second molars selected from boys and girls’ Iraqi children aged 8-9 years collected from different primary schools in Baghdad city. The mesiodistal dimensions of the selected teeth and the available maxillary and mandibular stainless-steel crowns from three different companies were measured by using a 3-D scanner, and then the whole measurements were calculated usin
... Show MoreIn this paper fractional Maxwell fluid equation has been solved. The solution is in the Mettag-Leffler form. For the corresponding solutions for ordinary Maxwell fluid are obtained as limiting case of general solutions. Finally, the effects of different parameters on the velocity and shear stress profile are analyzed through plotting the velocity and shear stress profile.