Background: The purpose of this study is to investigate the relationship between the roots of the maxillary posterior teeth and the maxillary sinus using spiral computed tomography, and measured the distances between the roots of the maxillary posterior teeth and the sinus floor. Materials and Methods: The sample of the present study was a total of 120 Iraqi subject (60 males & 60 females) aged (20-60) years old, who admitted to spiral Computed Tomography scan unit in AL-Zahraa hospital in AL-Kut city to have Computed Tomography scan of the brain and paranasal sinuses who had complaints of headaches or with suspicion of sinusitis but without pathological findings in maxillary sinuses. From November 2012 to April 2013, CT sagittal reconstructed images were used in this study, Images were classified according to the relation between the root apices and the maxillary sinus floor into type1: Root apices below the sinus floor, type 2: Root apices in cosines floor. Vertical distance were measured between the deepest point of the maxillary sinus floor and the root apices of the maxillary first and second premolars and first, second molar contact with the sinus floor) and type 3: Root apices penetrate or inside the r using built-in measurement tools. Means, standard deviations and minimum and maximum values were calculated for all right and left premolars and molars. t-tests were used to compare measurements between left and right sides and between female and male patients. Results: The distance between sinus floor and root apex was longest for the first premolar palatal root apex and shortest for the second molar mesoibuccal root apex for both right and left sides. No statistically significant differences were found between the right and left side measurements or between females and males patients. Conclusion: There was no significant difference in vertical relation of maxillary posterior teeth to floor of maxillary sinus between male and female and between right and left side. The mesiobuccal root of the maxillary 2nd molar was closest to the maxillary sinus floor and palatal root of 1st premolar was farthest to the sinus floor.
This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
Abstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreSentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreIn this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during di
... Show MoreMedical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w
... Show More