Background: The vertical distance between the upper and lower incisal edge of the central incisors when the mouth is opened as wide as possible is called maximum mouth opening (MMO). Any pathological change in the masticatory system had a direct effect on the maximal mouth opening. The aim of this study was to evaluate the relationship between the maximum bite force and the maximum mouth opening among group of children. Materials and methods: Four hundred children of both genders were included in this study, their age ranged from eight to ten years. Anterior and posterior (right, left) bite force were measured using bite force sensor. Maximum mouth opening was evaluated by electronic digital caliper. Data was statistically analyzed by descriptive statistics and by using paired t‑test and Chi‑square test. Results: The value of Maximum mouth opening was increased with the increasing of age in both genders; however, boys had higher value of Maximum Mouth opening than that of girls. A significant difference was found between genders among 9 years old children concerning the maximum bite force. A weak positive relation was observed between Maximum mouth opening and Maximum Bite Force among the boys in both of the age groups. Conclusions: In this study, a significant positive correlation was found between Maximum bite force and Maximum Mouth opening for boys, as they had higher mean value of maximum mouth opening and maximum bite force than girls.
The haplotype association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease.Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls.It starts with inferring haplotypes from genotypes followed by a haplotype co-classification and marginal screening for disease-associated haplotypes.Unfortunately,phasing uncertainty may have a strong effects on the haplotype co-classification and therefore on the accuracy of predicting risk haplotypes.Here,to address the issue,we propose an alternative approach:In Stage 1,we select potential risk genotypes inste
... Show MoreThe research addresses the importance of reading and writing for sura Al-alaq and Al-qalam as they represent the main sources for all the sciences as well as ethical values. The researcher seeks to define the educational and ethical values in these two texts which related to reading and writing. To do this, the author went through different relevant literature to show the similarities and related points between them, she also shows the significant of reading and writing and the learning and teaching worth to be consider. The result revealed that the both texts assert on the educational and ethical values, and the vital role of reading and writing.
Bac kground: The transfer of the tibialis posterior tendon to the anterior aspect
of the ankle not only replaces the function of the paralyzed muscles, but also
removes the deforming force on the medial aspect of the foot.
Objec t i ves : In this study, we evaluated patients who underwent tibialis
posterior tendon transfer for the treatment of foot drop, and comparison through
interosseous membrane route versus anterior to lower tibia route of tibialis
posterior tendon transfer, with evaluation of the results according to carayon
criteria
Methods: Nine patients with foot drop secondary to different causes treated with
tibialis posterior tendon transfer from January 2011 to January 2012 were
followed up for a
The Main Outfall drain pumping station in Nassiriyah is an important part in operation system of the Main Outfall Drain (MOD) where it reduces the water levels in the U/S area of its and converted through Syphon freely under the Euphrates, its consists of several parts: U/S Basin, Station Building which contains 12 pumps, and Head Basin with Syphon, This station suffers from high levels especially in D/S area due to the current situation which is represented by establishing of dyke with pipes on MOD which located at 24 km from D/S of pumping station and Al-Khamisiyah Canal which located at 2.3 km from the U/S of dyke which feeds(Al Hammar Marsh) during drought season, several scenarios were adopted in order to expl
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreA liquid membrane process of Alkaloids extraction from Datura Innoxia solution was studied applying pertraction process in rotating discs contactor (RDC). Decane as a liquid membrane and dilute sulphuric acid as stripping solution were used. The effect of the fundamental parameters influencing the transport process, e.g. type of solvent used, effect of disks speed, amount of liquid membrane and effect of pH for feed and strip solution. The transport of alkaloids was analysed on the basis of kinetic laws of two consecutive irreversible first order reactions. Thus, the kinetic parameters (k1, k1, , tmax, and ) for the transport of alkaloids were determined. The effect of organic membrane type on percentage of Alkaloids transport was found
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More