Background: This study aimed to use the combined mesio-distal crowns widths of maxillary incisors and first molars as predictors to the combined mesio-distal crowns widths of maxillary and mandibular canines and premolars. Materials and methods: The sample included 110 Iraqi Arab subjects with an age ranged between 17-25 years and class I skeletal and dental relations. The crown widths of maxillary teeth and mandibular canines and premolars were measured at the largest mesio-distal dimension on the study casts using digital electronic caliper with 0.01 mm sensitivity. Pearson’s correlation coefficient was used to determine the relation between the combined mesio-distal crowns widths of maxillary incisors and first molars and the combined mesio-distal crowns widths of maxillary and mandibular canines and premolars. Regression analysis was used to determine the equations that predict the widths of maxillary and mandibular canines and premolars. Paired sample t-test was used to compare between the actual and predicted mesio-distal crown widths. Results and Conclusions: The findings showed a non-significant difference between the predicted and actual mesio-distal crown widths; hence the combined mesio-distal widths of maxillary incisors and first molars can be used as predictors for the combined mesio-distal widths of maxillary and mandibular canines and premolars.
The research aims to identify the role of strategic improvisation as an independent variable with its dimensions (Building the Solution, Intuition, Adaptation, and Spontaneity) and the Entrepreneurial Orientation as a dependent variable with its dimensions (Identifying Opportunities, Creativity, Adopting risk, and Vision). This research has been applied in the Rafidain Bank and its branches (Sunk, People, Al-Firdaws, and Alawiya); it used the questionnaire as a basic tool for collecting information. The sample was intentionality, which included all the heads of departments in the bank’s branches, which amounted to (33) workers, and data on the questionnaire paragraphs of 28 were processed using the SPSS V.23 and AMOS V.23). The most impor
... Show MoreThe social networking sites have become one of the most important promotional instruments for their characteristic of facilitation of communication and the creation of public platform for discussion and formation of new points of view. These sites were used in the political marketing process where politicians use Facebook pages to promote their ideologies and spread their programs for the purpose of an influencing public opinion.
This research deals with the way by which political products are the Iraqi parliament. We adopt the methodology for analyzing the contents of these pages during three months starting from September,12 2016 to March 1, 2017 characterized by a lot of changes and events, in particular the beginning of the war o
Islamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the
Scientists are investigating the efficacy of different biosorbents for promoting economic and environmental viability in purifying contaminants. Among the primary by-products of biodiesel production is waste microalgae biomass, which has the potential to be used as a cheap biosorbent for the treatment of pollution. In the present study, the biomass left over after extracting the chlorella vulgaris was used to test the potential biosorption of CIP from simulated aqueous solutions. Bisorbent's ability was characterized using Fourier transform infrared spectroscopy (FTIR), scanning electron microscopy (SEM), and energy-dispersive X-ray spectroscopy (EDX). Analysis with a Fourier Transform Infrared Spectrometer revealed that C
... Show MoreThe monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreVarious theories have been proposed since in last century to predict the first sighting of a new crescent moon. None of them uses the concept of machine and deep learning to process, interpret and simulate patterns hidden in databases. Many of these theories use interpolation and extrapolation techniques to identify sighting regions through such data. In this study, a pattern recognizer artificial neural network was trained to distinguish between visibility regions. Essential parameters of crescent moon sighting were collected from moon sight datasets and used to build an intelligent system of pattern recognition to predict the crescent sight conditions. The proposed ANN learned the datasets with an accuracy of more than 72% in comp
... Show MoreThe new ligand [N1,N4-bis((1H-benzo[d]Glyoxalin-2-yl)carbamothioyl)Butanedi amide] (NCB) derived from Butanedioyl diisothiocyanate with 2-aminobenz imidazole was used to prepare a chain of new metal complexes of Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Ag(I), Cd(II) by general formula [M(NCB)]Xn ,Where M= Cr(III), n=3, X=Cl; Mn(II), Co(II), Ni(II), Cu(II), Pd(II), Cd(II) ,n=2 , X=Cl; Ag(I), n=1, X=NO3. Characterized compounds on the basis of 1H, 13CNMR (for (NCB), FT-IR and U.V spectrum, melting point, molar conduct, %C, %H, %N and %S, the percentage of the metal in complexes %M, Magnetic susceptibility, thermal studies (TGA),while its corrosion inhibition for mild steel in Ca(OH)2 solution is studied by weight loss. These measureme
... Show MoreBegging is an ancient social phenomenon since the Man's creation. It was simple at its beginning to get a living and the family needed, but presently, this simple social phenomenon converted to a big phenomenon which controlled by competent groups away from the values and principles. Their doings are far from humanity representing by the cutting of a hand or a foot and facial distortion or removed eye as a way of attracting people's emotions to get material and incorporeal helps; these doings became a trade which is exchanged by slave traders. Furthermore, different illegal and greedy methods were followed as a way of blackmailing others; contrariwise other cases of begging are doing by a people who real poor and needy. In this case, the
... Show MoreSilver nanoparticles synthesized by different species