Background: presence of lingual vascular foramina and canals in the interforaminal region may increase the risk ofsurgical complications during implant placement or any surgical procedure in this area. Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended Al-Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canal
... Show MoreThe life insurance marketing faces many difficulties because it is not a current tangible commodity, so it needs a planning for promotional activities and data about prospective applicants according to many factors such as age and residence area , marital status and profession to determine the group wich need insurance covers. &nb
... Show MoreLight has already becomes a popular means of communication, and the high-bandwidth data into free space without the use of wires. A great idea took us to design a new system for transmitting sound through free space at (650, 532) nm wavelengths using reflective mirrors under different atmospheric conditions. The study showed us the effect of various weather factors (temperature, wind speed and humidity) on these wavelengths for different distances. As well as studying the attenuation caused by long-distance laser and beam divergence, A reflective dish was used to focus the spot of the laser beam on the photocell. Results were discussed under the effect of these factors and the attenuation resulting from the beam divergence. Thus, the sys
... Show MoreCitrus fruit contain variety of flavonoids such as Hesperidin (the principal flavonoid in oranges and grapefruit). Hesperidin is found in high concentration in fruit peel of oranges and in substantially lower concentration in juice of these fruits. Hesperidin was extracted from oranges peel by treating the peels with calcium hydroxide. HPLC technique was used to determine hesperidin. Hesperidin was saperated and purified in a purity of about 90.1-95.7% and yield about 1.5 %w/w from oranges peel dry powder. Both hesperidin and oranges peel extract showed significan antibacterial activity. Sensitivity to hesperidin and oranges peel extracts were not similar for the chosen bacteriaCrude orange peel extract gave a various antimicro
... Show MoreLearning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are con
... Show MoreBy measuring Adropin, fasting blood glucose (FBG), cholesterol, high-density lipoprotein (HDL), triglycerides (TG), low-density lipoprotein (LDL), and very low-density lipoprotein (VLDL) in the sera of Iraqi patients with MetS and type 2 diabetes mellitus (T2DM), the current study was designed to compare some crucial markers in metabolic syndrome (MetS) sera and diabetic patients (T2DM) with control. Twenty female subjects were divided into three groups: group I=40 with MetS and group II=40 with T2DM, and 40 healthy subjects were employed as a control group. Compared to the control group, Adropin levels in the Mets group and T2DM group decreased significantly (p < 0.05). In contrast, none of the patient groups (MetS and T2DM)
... Show MoreThis research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the
... Show MoreThis paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More