Background: Prosthodontists estimated the parallelism of the occlusal plane to different anatomical landmarks, which was somewhat arbitrary and depended mainly on their vision. The aim of this research was to assess the degree of accuracy of prosthodontists in determining the parallelism of two lines. This research was aimed to assess which technique would be more accurate for the prosthodontist to distinguish parallelism; the comparison of the occlusal plane with the interpupillary line or with the inferior border of the earlobes. Materials and methods: Twenty eight prosthodontic specialists were included in this research. Illustrations of two lines with different tilts were presented to the participants to distinguish whether parallel or not. These illustrations were divided into two groups; the first group was with lines close together, used with the earlobes and occlusal plane, and the second group was with lines farther apart, used for the interpupillary line and occlusal plane. Results: Prosthodontists were accurate to a fraction of a degree in detecting non-parallel lines. Lines closer together were evaluated more accurately than lines farther apart. Males were slightly better when the lines were closer together. Age, experience, and post graduate degrees didn’t seem to play any role in the judgment of the prosthodontist. Conclusion: Prosthodontists were very accurate and reliable in judging parallel lines. Concerning the comparison of parallel lines, earlobes were better landmarks for orienting the occlusal plane than the interpupillary line.
The aim of the study is to investigate the extent to which the teachers of Islamic education and their teachers taught the technological innovations in the universities and to test the significance of the differences between the averages of the degree of practice according to the variables: gender, experience, scientific qualification, and educational stage. To achieve these objectives, a questionnaire consisting of (20) (20) teacher and school, teachers of Islamic education in Iraqi universities.
The results indicated that the degree of the practice of Islamic education teachers and their teachers of technological innovations was moderate, and there were statistically significant differences in the variable of
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreThe study aimed to evaluate Glucagon-Like Peptide-1 levels in Polycystic ovary syndrome (PCOS) infertile female with Diabetes Mellitus (DM) and compare the results with control group, also, to find the correlation for GLP-1 with Luteinizing hormone (LH), Follicle stimulating hormone (FSH) and LH/FSH ratio that may be used in prediction atherosclerosis in these patients. The study included nineteen women with age ranged (30-40) years and BMI ranged between (30-35) Kg/m 2. Subjects were divided into two groups: group (1) consist of (45) females as a healthy control and group (2) consist of (45) infertile females with PCOS and DM as complication. Fasting serum glucose was determined by using commercial kits (Biolabo SA-France); LH, FSH, prolac
... Show MoreJurisprudential disagreements are a significant source of a vast jurisprudential wealth. Among the manifestations of these disagreements are scholarly critiques raised by some scholars against others, claiming their divergence from the legal evidence or established principles for deducing legal rulings. One such critique is presented by the narrator scholar Abu Bakr Ibn Abi Shaybah, may Allah have mercy on him, directed towards Abu Hanifah al-Nu‘man, may Allah have mercy on him. In his compilation, Ibn Abi Shaybah cited numerous hadiths and traditions that he considered conflicting with the judgments as perceived by Imam Abu Hanifah, may Allah have mercy on him. These issues cover various branches of jurisprudence, including worship, sale
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreThe two most popular models inwell-known count regression models are Poisson and negative binomial regression models. Poisson regression is a generalized linear model form of regression analysis used to model count data and contingency tables. Poisson regression assumes the response variable Y has a Poisson distribution, and assumes the logarithm of its expected value can be modeled by a linear combination of unknown parameters. Negative binomial regression is similar to regular multiple regression except that the dependent (Y) variables an observed count that follows the negative binomial distribution. This research studies some factors affecting divorce using Poisson and negative binomial regression models. The factors are unemplo
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreIt is very well known in the planning publications that when creating spacing development to a region or sub-region, it can be able to make more than an alternative consisting with the strategic directions overtaken from the actual development of region and the situational and developmental objectives needed. However, the difficulty facing the situational planning is in selecting one of these alternatives to be the best in order to make a balanced situational re-structure, and achieving the economic, social and civil objectives. The developmental situation elements in the regions and governorates, including (Karbala) impose themselves as situational power which implies the process of re-structural arrangement where the situational develo
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More