Abstract Background: This study is aimed to assess the maxillary incisors’ root position, angulation, and buccal alveolar bone thickness in both genders and different classes of malocclusion using cone‑beam computed tomography (CBCT). Materials and Methods: Two hundred and six CBCT images were gathered and analyzed by three‑dimensional On‑Demand software to measure the variables of 803 maxillary central and lateral incisors. Genders and class difference was determined by unpaired t‑test, one‑way ANOVA, and Chi‑square tests. Results: Buccal root position of the maxillary incisors accounted for in the majority of the cases followed by the middle and palatal positions. The thickness of alveolar bone appears to have nearly the same pattern of decreasing in the mean values above the level of 2 mm from the crest of the bone up to the 6 mm level then increase in the apex of the root. The angle between the long axis of the maxillary incisors and the corresponding alveolar bone is higher significantly in class II followed by class I and III with no significant gender difference. Conclusions: most of the maxillary incisors examined were located in a very close position to the buccal cortical plate and covered by a thin buccal bone wall. The apparent association was noted between the incisors’ root position and angulation in the alveolar bone with the buccal
This study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that
Cadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values (7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil
... Show MoreThis research deals with increasing the hardening and insulating the petroleum pipes against the conditions and erosion of different environments. So, basic material of epoxy has been mixed with Ceramic Nano Zirconia reinforcement material 35 nm with the percentages (0,1,2,3,4,5) %, whereas the paint basis of broken petroleum pipes was used to paint on it, then it was cut into dimensions (2 cm. × 2 cm.) and 0.3cm high. After the paint and percentages are completed, the samples were immersed into the paint. Then, the micro-hardness was checked according to Vickers method and thermal inspection of paint, which contained (Thermal conduction, thermal flux and Thermal diffusivity), the density of the painted samples was calculate
... Show MoreA specific, sensitive and simple method was used for the determination of: vitamin B9 (Folic acid) in pure and pharmaceutical formulations using continuous flow injection analysis. The method is based on formation of ion pair compound between folic acid and ammonium molybdate in an aqueous medium to obtain a gray precipitate complex, using homemade; Ayah-6SX1-ST-2D solar cell CFI Analyzer. Optimum parameters was studied to increase the sensitivity for developed method. The linear range for the calibration graph was 0.01-0.6 mMol.L-1 of vitamin B9 and LOD was 131.994 ng/sample with correlation coefficient ( r ) of 0.9810, RSD% was lower than 0.1%, (n=9) for the determination of vitamin B9 at concentration (0.07and 0.5) mMol.L-1 respectiv
... Show MoreForest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data
... Show MoreThis research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram, and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods.
Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More