Preferred Language
Articles
/
jbcd-2381
Radiological Evaluation of The Anatomic Characteristic of Lingual Foramina and Their Vascular Canals in The Anterior Region of The Mandible Using Cone Beam Computed Tomography
...Show More Authors

Background: presence of lingual vascular foramina and canals in the interforaminal regionmay increase the risk ofsurgical complications during implant placement or any surgical procedure in this area.Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended AL- Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canals. Their presence, number, diameter, position, and orientation were established. Results: Lingual foramina in the anterior mandible were viewed in whole sample. Number of lingual canals varied from (1-5), the average diameter of the canals was (0.81 mm). The average distance from the foramina to the base of the mandible and to the alveolar crest was (13.78 mm) and (16.05mm), respectively. There was no significant correlation found between age and gender on all selected measurements. There was significant association of diameter of lingual foramen with the count, situation, extent and direction of lingual canal through the mandible width. Conclusion: Cone beam computed tomography is an invaluable system in diagnosis and treatment planning of surgical procedures. It help in detection of various anatomic features of mandible like presence of lingual foramen and canals in the anterior mandible.

Crossref
View Publication
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Hemato-Serological Findings as Early signals in Nile Tilapia Oreochromis niloticus Treated with Benzalkonium Chloride
...Show More Authors

To evaluate the toxicity of benzalkonium chloride in aquaculture, the hemato-serological indices of Nile tilapia Oreochromis niloticus are used as biomarkers. Following exposure to three concentrations of benzalkonium chloride BAC 0.1, 0.25, 0.50, and 1 mg/l (BAC1,2,3 and 4) in aquaria for two durations 21 and 42 days, the microbiological assay in fish aquaria, in addition to blood parameters were assessed. Except for the mean difference between BAC2 and BAC3 (P > 0.05) at 42 days, the mean values of the bacterial counts revealed a significant difference between all compared groups (0.05 ≥ P ≤ 0.01). Following exposure to the lower concentrations of BAC (1, 2 and 3), the main blood parameters of Oreochromis niloticus namely red bl

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Highly-charged EDTA-2Na salt as a novel draw solution in pressure-retarded Osmosis process
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Soft Computing
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Minimizing error in robot arm based on design optimization for high stiffness to weight ratio
...Show More Authors

In this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.

A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Samarra Journal Of Engineering Science And Research
Proposed low Xilinx FPGA power consumption for recursive NOMA applied in optical visible light communication
...Show More Authors

Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Sum Rate Maximization Versus MSE Minimization in FDD Massive MIMO Systems With Short Coherence Time
...Show More Authors

View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref