Background: Bone density is a major factor that affect mini implant primarily stability; no Iraqi studies have evaluated bone density related to mini-implant placement for orthodontic anchorage at age 13 -15 years. The present research aims to evaluate gender, side and site differences in the bone density at various orthodontic implant sites for the maxillary alveolar bone. Materials and methods: Twenty nine individuals (16 males and 13 females) had subjected to clinical examination, then 64-multislice computed tomography scan data were evaluated and bone density was measured in Hounsfield unit at 21 points (9 points for each side and 3 points between the right and left central incisors) . Results: The results obtained showed that there ar
... Show MoreBackground: Adenoiditis is a common cause of otitis media with effusion (OME) in children & perhaps OME is one of the most common diseases leads to hearing impairment in children with subsequent impairment of speech development & learning difficulties , however, treatment remains controversial. Objectives: To evaluate if there is a significant advantage of tympanostomy tube insertion in association with adenoidectomy over adenoidectomy in association with myringotomy alone in treatment of children with OMEType of the study: This is a prospective study. Patients & methods: The study consisted from 63 children diagnosed as cases of bilateral OME & variable degrees of adenoid hypertrophy. The patients were divided randomly i
... Show MoreInternal control system is a safety valve that preserves economic units assets and ensure the accuracy of financial data, as well as to obligation in the laws, regulations, administrative policies ,and improve the efficiency, effectiveness and economic of operation, so it has become imperative for these units attention to internal and developed control system The research problem in exposure the economic units when the exercise of their business to many of the risks to growth or hinder the achievement of its objectives and the risks (financial, operational, strategy, risk) and not it rely on risk Assessment according to modern scientific methods, as in Brown's risk Classification, Which led to the weakness of the internal control identif
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreAn oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More