Background: It has been well known that the success of mandibular implant- retained overdenture heavily depends on initial stability, retention and long term osseointegration this is might be due to optimal stresses distribution in surrounding bones. Types of mandibular implant- retained overdenture anchorage system and number of dental implants play an important role in stresses distribution at the implant-bone interface. It is necessary to keep the stresses below the physiologic tolerance level of the bone .since. And it is difficult to measure these stresses around bone in vivo. In the present study, finite element analysis used to study the stresses distribution around dental implant supporting Mandible implant retained overdenture Materials and methods: Eight models were constructed including four designs of anchorage system (ball-cup, ball-O Ring, bar without distal extension and bar with distal extension).The first group of models were supported by four dental implant and second group of models were supported by two dental implant only. Models constructed from the data obtained directly from patient The contour of bone was obtained from C.T scan image of patient, then data transferred to ANSYS program for modeling then load applied and solve the equation by the program, Specified nodes were selected at the rings of crestal bone (cortical bone) and cortical cancellous interface around each dental implant and fixed for all models to monitor the stress change in that regions of different design of MIR-OD.. After load application, Specified nodes were selected at the rings of crestal bone (cortical bone) and cortical cancellous interface around each dental implant and fixed for all models to monitor the stress change in that regions of different design of MIR-OD . Results: In the present study the stress distribution and maximum stresses value around dental implant had a relationship to the number of dental implant. , The result appeared that the maximum stresses and means of stresses value was lower in the first group of models (which was supported through the use four dental implant) than the second group of models (which was supported through the use of two dental implant only). For the first group of models the maximum stresses value around mesial implant was11.67, 10.51, 10.98 and 10.72 Mpa, while the maximum stresses around distal implant was 21.33, 18.51, 18.86, and17.56 Mpa for models 1,2,3 and 4respectively ,and the stresses around implant supporting second group of models was 22.52, 22.16, 20.51 and 19.60 Mpa for models 5,6,7and8 respectively .Statistical analyses of means value appeared that there was statistically significant difference in stresses means value around implant of the second group with that’s values around mesial and distal implant supporting first group of model . Regarding the result of both ball and bar system, it has been demonstrated that stress was greater with ball attachment and MIR-OD supported by the use of four dental implants and anchored by bar attachments with distal extension gives the minimum values of stresses than the rest models. Also the results show that higher stresses value was appeared at the cortical bone ring surrounding dental implant especially the distal implant nearest to the free end extension area. Also it was appeared that the best model was Mandible implant- retained overdenture that’s anchored by bar with distal extension and support by four dental implant. Conclusions: Bar-clips with distal extension mode of attachment considered the best type in producing the least stresses around dental implant regardless number of dental implant used.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreNAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010
Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten
... Show MoreThis paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera
... Show MoreAutonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreThe significant shortage of usable water resources necessitated the creation of safe and non-polluting ways to sterilize water and rehabilitate it for use. The aim of the present study was to examine the ability of using a gliding arc discharge to inactivate bacteria in water. Three types of Bacteria satisfactory were used to pollute water which are Escherichia coli (Gram-negative), Staphylococcus aurous (Gram-positive) and salmonella (Gram-negative). A DC power supply 12V at 100 Hz frequency was employed to produce plasma. pH of water is measured gradually during the plasma treatment process. Contaminated water treated by gliding arc discharge at steadying the gas flow rate (1.5 l/mi
Doses for most drugs are determined from population-level information, resulting in a standard ?one-size-fits-all’ dose range for all individuals. This review explores how doses can be personalised through the use of the individuals’ pharmacokinetic (PK)-pharmacodynamic (PD) profile, its particular application in children, and therapy areas where such approaches have made inroads.
The Bayesian forecasting approach, based on population PK/PD models that account for variability in exposure and response, is a potent method for personalising drug therapy. Its potential utility is eve
Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical featu
... Show More
