ABSTRACT Backgrounds: Maxillary canine impaction is complicated and time consuming to treat, for being highly diverse in inclination and location; it may be a companied by root resorption of the neighboring teeth. CBCT has been used for its' diagnostic reliability in localization of impacted canine and revealing its' serious local complications. Objectives: Localization of maxillary impacted canine using cone beam computed tomography for assessment of angulation, distance from occlusal plane, alveolar width and proximity to adjacent teeth. Subjects and Methods: The study sample was 33 subjects 16 females and 17 males attended to Al-Wasitti general hospital in Baghdad city-Oral and maxillofacial radiology department for CBCT scan investigationfrom November/2015 to April/2016. By using theCS 9000 device, 3D images and coronal, axial and sagittal views obtained to perform the selected measurements. Results: Contact of impacted canine to the nearby teeth had a strong effect on their root resorption. Vertical or horizontal angulation measurement in axial view, was not possible for a number of cases.Comparison of the angulation measurement validity between axial and coronal views, had showed an obvious statistical difference in coronal view for vertical angulation, and in the axial view for horizontal angulation calculation. Correlation of the canine localizations found in the study with the measurements, showed a significant statistical difference with age and vertical angulation (coronal view). Age or gender correlation with the measurements wasnon significant statistically, except for age with vertical angulation (coronal view). Conclusion: utilization of CBCT provides a worthy data about the impacted maxillary canine localization, for more explanation and treatment of these cases surgically and by orthodontics.
In this article, new Schiff base ligand LH-prepared Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II), and Pt(II) materials were analyzed using spectroscopy (1 Metal: 2 LH). The ligand was identified using techniques such as FTIR, UV-vis, 1H-13C-NMR, and mass spectra, and their complexes were identified using CHN microanalysis, UV-vis and FTIR spectral studies, atomic absorption, chloride content, molar conductivity measurements, and magnetic susceptibility. According to the measurements, the ligand was bound to the divalent metal ions as a bidentate through oxygen and nitrogen atoms. The complexes that were created had microbicide activity against two different bacterial species and one type of fungus. DPPH techniques were bei
... Show More
The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca
The A2?u-X1?g+ emission band system of 7LiH1 molecule has been calculated for Lambda doubling. The relation between wave number ?p , ?Q , ?R conducted the energies of the state of rotation F (J), and (J + 1) with rotational quantum number J, respectively, of 7LiH1 molecule for statehood A2?u using the rotation, fixed vibrational states of both the ground and raised crossovers vibrational against ???= 0 to V ' = 0-4using rotational levels J = 0 to J = 20 have found.
After baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosph
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreGreen nanotechnology is a thrilling and rising place of technology and generation that bracesthe ideas of inexperienced chemistry with ability advantages for sustainability, protection, andthe general protection from the race human. The inexperienced chemistry method introduces aproper technique for the production, processing, and alertness of much less dangerous chemicalsubstances to lessen threats to human fitness and the environment. The technique calls for inintensity expertise of the uncooked materials, particularly in phrases in their creation intonanomaterials and the resultant bioactivities that pose very few dangerous outcomes for peopleand the environment. In the twenty-first century, nanotechnology has become a systematic
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show More