Background: Tumor-like overgrowth lesions of the oral mucosa are pathological growths that project above the normal contour of the oral surface. A practical classification can be made according to the site of origin, the etiology and the histological appearance. The aim of this article is to evaluate and analyze patients with gingival and alveolar ridge tumor-like overgrowth lesions in terms of surgical treatment, diagnosis and outcome. Materials and Methods: Patients complaining of these lesions were treated by surgical excision under local or general anesthesia; the excised lesions were submitted for histopathological examination, during the follow up period the patients were examined for complications and recurrence. Results: Pyogenic granuloma was the most frequently encountered lesion, followed by peripheral giant cell granuloma, fibrous hyperplasia, peripheral ossifying fibroma and neurofibroma. Complications were minimal and recurrence occurred in one patient. Conclusion: Gingival and alveolar ridge overgrowths are common being mostly reactive rather than neoplastic in nature, global recurrence rate was 2.1%.
The problem of constant and change values is one of the important problems that the philosophy thought had faced as the religious and social studies had taken it as it considers as one of the most dangerous which touch the basic . the research deals with the effect of change value of new Iraqi situation to be as an attempt , as participation or an excitement that can be occupied a space through the area of questions on the fix and change of moral values shed light on the economical ,social and political events that the Iraqi society passes through them .it is part of interests that becomes importance to everyone through the light of moral change Which is arbitrary to the life of the individual .It is not possible to rebuild the society o
... Show MoreEuphemism is an important linguistic phenomenon that tends to soften written or oral expressions. Thus, when translators or interpreters face expressions including euphemism, they need to know how to deal with them. The problem of the current paper lies in the effect of rendering euphemistic expressions inaccurately, as such expressions represent the cultural and terminological sense of the original language. Thus, rendering them improperly will affect the sense of the interpreted speech. For this, it is essential for translators in general and simultaneous interpreters in particular to know the importance of utilizing euphemism in the simultaneous interpreting field, which is the main aim of this paper. To this end, a systematic review
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreIn the current study, haemoglobin analytes dissolved in a special buffer (KH2PO4(1M), K2HPO4(1M)) with pH of 7.4 were used to record absorption spectra measurements with a range of concentrations from (10-8 to 10-9) M and an absorption peak of 440nm using Broadband Cavity Enhanced Absorption Spectroscopy (BBCEAS) which is considered a simple, low cost, and robust setup. The principle work of this technique depends on the multiple reflections between the light source, which is represented by the Light Emitting Diode 3 W, and the detector, which is represented by the Avantes spectrophotomer. The optical cavity includes two high reflectivity ≥99% dielectric mirrors (dia
... Show MoreI have studied the relationship between blood groups in humans and disease Cutaneous injury for the first time in Iraq study showed the presence of a significant statistical relationship between them leather Bmsoy in hospitals in Baghdad and its suburbs
This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreAbstract This paper is devoted to introduce weak and strong forms of fibrewise fuzzy u-topological spaces, namely the fibrewise fuzzy q-u-topological spaces, weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces.