Background: The frontal sinus area can be used as a diagnostic aid to recognize mouth breather subjects. The aims of this study were to determine the gender difference in each group, to compare the frontal sinus area between mouth breather and nasal breather group, and to verify the presence of correlation between the frontal sinus area and the cephalometric skeletal measurements used in this study. Materials and Methods: Cephalometric radiographs were taken for 60 adults (30 mouth breathers and 30 nasal breathers) age range (18-25), for each group 15 males and 15 females, in the orthodontic clinic in the college of Dentistry at Baghdad University. The control group (nasal breather) with skeletal class I and ANB angle ranged between 2-4º, and have clinically class I occlusion. The cephalometric measurement for each group were taken, the cephalometric radiographs were analyzed by using AutoCAD 2007 program. Results and Conclusions: In comparison to nasal breather the mouth breather has larger Gonial angle giving a tendency to posterior rotation with growth of the mandible. The mouth breather has less maxillary length than the nasal breather. No effect of gender in mouth breather on gonial, SNA and SNB angles, no effect of gender in nasal breather on gonial angle, while the other cephalometric measurements were higher in males than females in each group. The mouth breather showed more anteroposterior extent of anterior cranial base; also the mouth breather show an increase in all facial height than the nasal breathers, the frontal sinus area is smaller in mouth breather than in nasal breather. The frontal sinus area showed correlation for both groups (Mouth and nasal breather) with maxillary Length, mandibular length, ramal length, S-N length, TAFH, UAFH, LAFH, TPFH, LPFH, and UPFH. There is only correlation of frontal sinus with the SNA and SNB angles in nasal breather and no significant correlation for both groups with the gonial angle.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show Morestructural and electrical of CuIn (Sex Te1-x)2
The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as
This paper studies the behavior of reinforced Reactive Powder Concrete (RPC) two-way slabs under static and repeated load. The experimental program included testing six simply supported RPC two-way slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. All the tested specimens were identical in their material properties, and reinforcement details except their steel fibers content. They were cast in three pairs, each one had a different steel fibers ratio (0.5 %, 1 %, and 1.5 %) respectively. In each pair, one specimen was tested under static load and the other under five cycles of repeated load (loading-unloading). Static test results revealed that increasing steel fibres volume fraction from 0.5 % to 1 % and from 1% to 1.5%,
... Show MoreHighway embankments stability during its service period represents an important factor for the safety of highway users and vehicles. Consequently, the cost of construction of these embankments should be adequate to maintain the safety and durability during this period through proper estimation of the loading on asphalt pavement, slope stability, horizontal and vertical deformation, etc. Slope stability of the embankment mainly depends on the shear strength of the soil layers materials; this shear strength is affected by the water table level through the contribution of the capillary water. Negative pore water pressure above the water table level evolves matric suction in the unsaturated zone above water table; this matric suction increases
... Show MoreThe synthesis, characterization and mesomorphic properties of two new series of triazine-core based liquid crystals have been investigated. The amino triazine derivatives were characterized by elemental analysis, Fourier transforms infrared (FTIR), 1HNMR and mass spectroscopy. The liquid crystalline properties of these compounds were examined by differential scanning calorimetry (DSC) and polarizing optical microscopy (POM). DSC and POM confirmed nematic (N) and columnar mesophase textures of the materials. The formation of mesomorphic properties was found to be dependent on the number of methylene unit in alkoxy side chains.
This research is devoted to study the effect of different in weight percentage of Sio2 particles and glass fibers (5, 10, 15, 20) wt. % on the wear rate epoxy resin. The results show that the value of hardness increase with the increase for the weight percentage of reinforcing particles and fibers, while the wear rate decrease with the increase the load level of the reinforcing particles and fibers . The largest value of the hardness, and the lowest value of the wear rate for epoxy reinforced with 20% of SiO2, the wear rate increase in general with increasing the applied load.
The purpose of this experiment was to determine the relationship between the path coefficient and seed rate for four different barley cultivars (Amal, Ibaa 265, Ibaa 99, and Buhooth 244) during the 2019-2020 winter season. The experiment was carried out using a split plot design with three replications according to a randomized complete block design (RCBD). The highest positive thru effect on grain yield was found for flag leaf area and harvest index at aseeding rate of 130 kg.h-1; the highest positive direct effect on grain yield was found for flag leaf area and plant height at aseeding rate of 160 kg.h-1; and the highest positive direct effe
Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More