Background: Survey of the occlusion in population groups usually include in their objections the academic assessment of occlusal feature, the planning resources for public health treatment programmers, the comparison of different population and the screening of groups for orthodontic treatment. Likewise a thorough investigation of the occurrence of malocclusions among school–students would be of major importance in the planning of orthodontic treatment in the public dental health services. For this purpose it is necessary to have detailed information on the prevalence of individual malocclusion among boys and girls at different ages distributed regionally, and moreover, an analysis of the need for orthodontic treatment in the different sc
... Show MoreThe aim of this study is to evaluate in-vitro activity of Cefamandol (Cfm) and Ceftazidime (Cfz), in combination with Clavulanic acid (CA) against ten complicated multiresistant uropathogenic E.coli .One hundred clinical strains were isolated from patients with chronic urinary tract infections (UTIs), these isolates were identified by the Api identification systems. The antimicrobial susceptibility tests were determined by Kirby-Bauer method, all of them were sensitive to Imipenem (Imp). Ten strains were chosen for the present study, they were resistant to Ampicillin (Amp), Amoxicillin (Amo), Carbenicillin (Cb), Ticarcillin (Tic), Azlocillin (Azl), Amoxicillin\ Potassium Clavulanate {Augmentin(Amc)}, (Amo\CA), Ticarcillin\ Potas
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More2929-2933
Background: Orthodontic mini-implants are increasingly used in orthodontics and the bone density is a very important factor in stabilization and success of mini-implant. The aim of this study was to observe the relationship among maximum bite force (MBF); body mass index (BMI); face width, height and type; and bone density in an attempt to predict bone density from these variables to eliminate the need for CT scan which have a highly hazard on patient. Materials and Methods: Computed tomographic (CT) images were obtained for 70 patients (24 males and 46 females) with age range 18-30 years. The maxillary and mandibular buccal cortical and cancellous bone densities were measured between 2nd premolar and 1st molar at two levels from the alveol
... Show MoreObjectives To compare the clinical efficacy of microvascular decompression surgery (MVD) and gamma knife radiosurgery (GKR) as a treatment for patients with primary trigeminal neuralgia (TN) and evaluate the outcome regarding pain relief, recurrence, and complications with both modalities of treatment. Patients and Methods A randomized prospective study conducted in SaadAlwitry Neurosciences Hospital, Baghdad, Iraq. Eighty-four patients with TN from January 2016 to January 2018, 45 patients had GKR while 39 patients treated with MVD. The pain evaluated pre-and post-operatively using the Barrow Neurological Institute Pain Intensity scale (BNIPI), visual analog scale (VAS) and Brief Pain Inventory Facial (BPI-Facial) scoring systems. In GKR p
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreThe present work provides to treat real oily saline wastewater released from drilling oil sites by the use of electrocoagulation technique. Aluminum tubes were utilized as electrodes in a concentric manner to minimize the concentrations of 113400 mg TDS/L, 65623 mg TSS/L, and the ions of 477 mg HCO3/L, 102000 mg Cl/L and 5600 mg Ca/L presented in real oily wastewater under the effect of the operational parameters (the applied current and reaction time) by making use of the central composite rotatable design. The final concentrations of TDS, TSS, HCO3, Cl, and Ca that obtained were 93555 ppm (17.50%), 11011 ppm (83.22%), 189ppm (60.38%), 80000ppm (22%), and 4200 ppm (25%), respectively, under the optimum values of the operational parameters
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.