The present study was designed to indicate the influence of the feeding plate on the nutritional and general health problems of the isolated cleft palate infants. For this study fourteen infants were taken, their ages between one day to one week, refered from cosmetic surgery and palate center to cleft lip and palate rehabilitation center in institute of technical medical / Baghdad for feeding plate purpose . Four infants put them as normal group; all those infants were subjected during (6th) month to evaluate the body weight, feeding problem and the respiratory infection. According to tables and figures this study showed a gradual improvement in nutritional problem including (feeding problem, body weight) and health problem (such as respiratory problem) of the cleft palate infants after the use of feeding plate starting from (4th) to (6th) month compared to normal group.
It is from the greatness of God Almighty and from him that he facilitated for me to delve into the immersion of the hadith of the Prophet in my doctoral dissertation, then I found it a fertile ground for the cultivation of scientific results.
Through this work, I chose the topic (Replies of Al-Aini to Ibn Malik in his book Umdat Al-Qari Sharh Sahih Al-Bukhari) because of its scientific impact, as such topics inspire in the soul of the follower and the student a lot of contemplation and great care to understand the texts and then come up with a result that is almost close. It is correct, and my current situation in this research is the condition of many scholars, not without errors and omissions. Whatever was correct is by the grace of
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreBackground: evaluate the effects of three different intracoronal bleaching agents on the shear bond strengths (SBS) and failure site of stainless steel and monocrystalline (sapphire) orthodontic brackets bonded to endodontically treated teeth using light cured orthodontic adhesive in vitro. Materials and methods: Eighty extracted sound human upper first premolars were selected, endondontically treated and randomly divided equally (according to the type of the brackets used) into two main groups (n = 40 per group). Each main group were subdivided (according to the bleaching agent used) into four subgroups 10 teeth each; as following : control (un bleached) group, hydrogen peroxide group (Hp) 35%, carbamide peroxide group (CP) 37% group and s
... Show MoreBackground: Age determination of skeletal remains is apart of many medico-legal as well as anthropological examination. Many anatomical structures have been studied, but the teeth and their measurements seem to be the most reliable method since teeth represent the most durable and resilient part of the skeleton. This study was undertaken for estimating the chronological age among Iraqi adult subjects based on various morphological variables of canine teeth using digital panoramic radiograph. Material and methods: The sample in the current study consisted of 240 Iraqi patients attending to the dental radiological clinic at College of dentistry/ Babylon University taking panoramic radiographs for different diagnostic purposes, the study samp
... Show MoreThis study is concerned with making comparison in using different geostatistical methods for porosity distribution of upper shale member - Zubair formation in Luhais oil field which was chosen to study.
Kriging, Gaussian random function simulation and sequential Gaussian simulation geostatistical methods were adopted in this study. After preparing all needed data which are contour map, well heads of 12 wells, well tops and porosity from CPI log. Petrel software 2009 was used for porosity distribution of mentioned formation in methods that are showed above. Comparisons were made among these three methods in order to choose the best one, the comparing cri