Objectives To determine the prevalence of oral lesions by age and gender among the pediatric population in Iraq. Materials and methods A review of the archives of the oral pathology department of Baghdad University from, 1970 Materials and Methods: A review of the archives of the oral pathology department of Baghdad University from 1970 to 2013 for all biopsies from children aged 0–15 years old. Results A total of 1286 child specimens represented 11.98% of all biopsied lesions. The pyogenic granuloma was the most frequent lesion in children, and the periapical cyst was the most frequent lesion from an odontogenic origin. The incidence of malignant lesions was higher in the 0–3 age group than other groups. Conclusions The majority of lesions were inflammatory or benign in nature, while 5.6% were malignant tumors. This study provides a data base for predicting the distribution of oral lesions in children with a …
Background: The most common reason for re-making a maxillofacial prosthesis is the degradation of the mechanical properties of the silicone. Aim of this study: To assess some mechanical properties of VST-50F maxillofacial silicone reinforced with a composite of silicon dioxide nanoparticle and polyamide-6 microparticle before and after artificial aging. Material and Method: Preparing 240 samples tested for tear strength, tensile strength and elongation percentage, hardness, and roughness before and after aging. The Silicon dioxide was added in concentrations of 1% by weight and Polyamide-6 in the concentration of 0.25% and 0.5% by weight to the VST-50F RTV maxillofacial silicone. The one-way ANOVA and post hoc tests were used for inferentia
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThis study is an attempt to investigate the conceptual metaphor of UP and DOWN commonly used in Iraqi community. Some of the metaphorical expressions in Iraqi colloquial Arabicarewidely used by Iraqi speakers in everyday language. Ithas been analyzed by following the cognitive theory of metaphor (Lakoff& Johnson,1980).The study indicates that the Iraqi speakerexperiences more of the metaphorical expressions of UP and DOWN to referto many of the abstract concepts that shape his/her impression of everyday life situations.
As cultures are mainly divided into collectivistic and individualistic, members tend to emphasize, through communication, either their position as part of their group or their independence from the group. This emphasis is manifested in using the pragmatic concepts of positive politeness and negative politeness. The present study looks into the reflection of these two cultures in Rockstar’s renowned video game, Red Dead Redemption 2 (2018). It aims at identifying the two cultures as present in the game and showing their significance to its narrative. It fills the gap in the studies of language used within video games as well as its cultural reflections. The study addresses the following question: What are the positive and negative
... Show More