Purpose: This study aimed to assess the thickness of alveolar bone of maxillary and mandibular incisors from orthodontics perspective. Materials and Method: A total of 73 Cone beam computed tomography for Iraqi patients (47 females and 26 males) were included in this study. The selected images were captured and imported to AutoCAD database software to perform the measurement. To measure alveolar bone thickness, a reference line was drawn through the long axis of each incisor, from the incisal edge to the root apex. Then, labial and lingual/palatal perpendicular lines were drawn to the reference line at 3, 6, and 9mm apically from the cemento-enamel junction (CEJ). Results: The buccal bone is generally thinner than the lingual/palatal bone. The bone gets relatively thicker closer to the apex. The buccal bone for all lower incisors was less than 1 mm at 3- and 6-mm distance. It was slightly thicker at the central incisor as compared to the lateral at 9-mm distance. Genders have a difference in the thickness of the palatal alveolar bone in their right and left lateral incisors, which are 3mm and 9mm, respectively. Alveolar bone thickness is significantly positively correlated with several teeth. Conclusions: Males and females in this study showed comparable alveolar bone thickness. The alveolar bone thickness increased with increasing age. It is essential to assess the thickness of alveolar bone pre-orthodontic treatment (especially for patients with thin biotype, and those cases that involve labial proclination of the lower incisors).
Encasing glass fiber reinforced polymer (GFRP) beam with reinforced concrete (RC) improves stability, prevents buckling of the web, and enhances the fire resistance efficiency. This paper provides experimental and numerical investigations on the flexural performance of RC specimens composite with encased pultruded GFRP I-sections. The effect of using shear studs to improve the composite interaction between the GFRP beam and concrete was explored. Three specimens were tested under three-point loading. The deformations, strains in the GFRP beams, and slippages between the GFRP beams and concrete were recorded. The embedded GFRP beam enhanced the peak loads by 65% and 51% for the composite specimens with and without shear connectors,
... Show MoreThe present study aimed to investigated Giardia duodenalis in cattle in some different areas of Wasit province by using molecular study and verification of the genotype of Giardia duodenalis. Collected one hundred fecal samples from cattle, the result showed that the rate of infection was 83% (100) . DNA was extracted from the 100 positive samples from the cattle then amplified using the special tris-phosphatesomerase gene for genotyping A and B. The result of type A infection was (69%) and (45%) of the genotype B. The purpose of this study was to investigate the genotypes of cattle in Wasit province and compare them with previous sources at the NCBI data bank.
Fisetin is a plant flavonoid found in strawberries and other fruits and vegetables such as apples, persimmons, and onions. It has many pharmacological effects like anti-inflammatory, antioxidant, cardioprotective, neuroprotective, and anti-carcinogenicity which are attributed to its ability to reduce oxidative stress which considers the main reason for different disease conditions. Genotoxicity refers to the genetic material destruction within the cell which can be caused by different chemicals as well as radiation. The present study evaluates the effect of orally-administered fisetin daily for seven constitutive days on genotoxicity induced by cyclophosphamide in rats’ bone marrow and spleen cells. Results showed that fisetin exh
... Show MoreBackground: Orthodontic force is considered to stimulate cells in the periodontium to release many mediators such as cytokines which play a responsible role for periodontal and alveolar bone remodeling, bone resorption and new bone deposition. Aim of this study was carried out to estimate changes of the (interleukin-one beta, tumor necrosis factor – alpha and C-reactive protein) levels in unstimulated whole saliva during the leveling stage of orthodontic tooth movement. Materials and methods: The sample consisted of thirty adult patients (12 males and 18 females) with ages ranges (19-23) years. Each sample had Class I and Class II malocclusion dental classification and required bilateral extraction of their maxillary first premolars, und
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreThe load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show More