Background: Alveolar ridge expansion is proposed when the alveolar crest thickness is ≤5 mm. The screw expansion technique has been utilized for many years to expand narrow alveolar ridges. Recently, the osseodensification technique has been suggested as a reliable technique to expand narrow alveolar ridges with effective width gain and as little surgical operating time as possible. The current study aimed to compare osseodensification and screw expansion in terms of clinical width gain and operating time. Materials and methods: Forty implant osteotomies were performed in deficient horizontal alveolar ridges (3–5 mm). A total of 19 patients aged 21–59 years were randomized into two groups: the screw expansion group, which involved 20 osteotomies performed by screw expander drills, and osseodensification group, which comprised 20 osteotomies achieved by osseodensification drilling technique. One millimetre below the alveolar bone crest was measured with a bone caliper at two intervals (before implant osteotomy and after implant osteotomy), and operating time was assessed. Results: Before expansion, the mean alveolar ridge width was 4.20 ± 0.71 mm in the osseodensification group and 4.52 ± 0.53 mm in the screw-expansion group. No statistically significant difference in alveolar bone width before expansion was found between the groups (P > 0.05). After the expansion of the alveolar ridge with osseodensification or screw expansion techniques, the average ridge width was 5.48 ± 0.57 mm in the osseodensification group and 5.71 ± 0.53 mm in the screw-expansion group. Difference in width gain postoperatively between the groups was 0.09 mm, which was not statistically significant (P > 0.05). According to operating time, osseodensification consumed 6.21 ± 0.55 minutes, and screw expansion required 16.32 ± 0.60 minutes for a single implant with a significant difference between the groups (P < 0.0001). Conclusion: Alveolar bone expansion by osseodensification showed comparable width gain and less surgical operating time compared with expansion by screw expansion technique.
BACKGROUND: Clavicle fractures are common injuries in young active individuals, the mid third of the clavicle is most commonly fractured part(80% of clavicle fracture) OBJECTIVE: To compare the outcomes of operative and non operative management of displaced and or comminuted closed fracture of the mid third of clavicle in young adults PATIENTS AND METHODS: This prospective observational study of 24 patients of fracture of the mid third of the clavicle was conducted in Alkindy teaching hospital from July 2015 to January 2017 and divided into two groups; one managed by operative treatment with plate and screws and the other by non operative sling immobilization after taking the consent and the patients were seen at 2, 4, 6 weeks,3, 6, and 9 m
... Show MoreThe present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method
... Show MoreA special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with
... Show MoreThe issue of human rights occupies great importance on the academia as well as in the reality, especially after the spread of ideas related to these rights on one hand and the large number of violations they are exposed to on the other hand, which makes it necessary to develop fundamental solutions to the remove the obstacles of implementing human rights.
In this research entitled (The Legal Basis of the Right to the City: A Comparative Study) we dealt with a new concept of human rights and discussed the basis upon which it is based in international charters, constitutions and domestic laws.
The continuous increases in the size of current telecommunication infrastructures have led to the many challenges that existing algorithms face in underlying optimization. The unrealistic assumptions and low efficiency of the traditional algorithms make them unable to solve large real-life problems at reasonable times.
The use of approximate optimization techniques, such as adaptive metaheuristic algorithms, has become more prevalent in a diverse research area. In this paper, we proposed the use of a self-adaptive differential evolution (jDE) algorithm to solve the radio network planning (RNP) problem in the context of the upcoming generation 5G. The experimental results prove the jDE with best vecto
Background: penetrating foreign body is a common problem but penetration by screw driver is very uncommon
Patient & method: A nine years old boy presented with penetrating screw driver through the medial canthus of the eye.
Result: the foreign body removed under GA with good result.
Conclusion: minimal invasive procedure are preferred when we have penetrating head injury.
This article introduces a numerical study on heat exchange and corrosion coefficients of Zinc–water nanofluid stream in a circular tube fitted with swirl generator utilizing CFD emulation. Different forms of swirl generator which have the following properties of plain twisted tape (PTT) and baffle wings twisted tape (BTT) embeds with various ratio of twisting (y = 2.93, 3.91 and 4.89), baffle inclination angles (β = 0°, - 30° and 30) joined with 1%, 1.5% and 2% volume fraction of ZnO nanofluid were utilized for simulation. The results demonstrated that the heat and friction coefficients conducted by these two forms of vortex generator raised with Reynolds number, twist ratio and baffle inclination angles decreases. Likewise, t
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
In this study, the effect of pumping power on the conversion efficiency of nonlinear crystal (KTP) was investigated using laser pump-power technique. The results showed that the higher the pumping power values, the greater the conversion efficiency (η) and, as the crystal thickness increases within limitations, the energy conversion efficiency increases at delay time of (0.333 ns) and at room temperature. Efficiency of 80% at length of KTP crystal (L = 1.75 X 10-3 m) and Pin = 28MW, and also, compare the experimental results with numerical results by using MATLAB program.