Preferred Language
Articles
/
dhc735IBVTCNdQwCT8KA
Evaluation of the Lingual Splitting Patterns and the Lateral Bone Cut Ends Following Mandibular Bilateral Sagittal Split Osteotomy Using Cone Beam Computed Tomography (CBCT)
...Show More Authors

The bilateral sagittal split osteotomy (BSSO) is the most popular orthognathic procedure performed by maxillofacial surgeons to treat skeletal class II and class III and to correct mandibular asymmetries. The study aimed to evaluate the lingual splitting patterns and lateral bone cut end (LBCE) in bilateral sagittal split osteotomy (BSSO) and their relation with the ramal thickness and the presence of impacted third molars using cone beam computed tomography (CBCT). This prospective observational study included patients with mandibular prognathism who were treated with BSSO with or without Le Fort I osteotomy. Cone beam computed tomography was used to measure the ramal thickness preoperatively and to evaluate the LBCE, and the lingual splitting patterns postoperatively. Twenty-one patients (42 sides) were included in this study. The most commonly observed lingual splitting pattern was type III (47.6%), while the most common LBCE was type B (59.5%). The bad split was encountered 8 times on 42 sides (16.7%). A nonsignificant relationship between the ramal thickness and bad splitting was observed (P=0.901). Impacted third molars were present in 16 of the 42 sides (38.1%) and had no significant effect on the occurrence of bad splitting (P=0.063). Type III lingual splitting pattern and type B LBCE were the most commonly observed patterns. No direct association was observed concerning the presence of impacted mandibular third molars and the thickness of the ramus with the occurrence of bad splitting.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The relationship between the family violence and variables
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The heart between the scientific and legal concept
...Show More Authors

 

summary of the research

The heart is the pine-shaped flesh on the left side of the chest. The moral gentleness in this flesh is called the home of perception, reason and understanding, as well as the place of desires and passions, so it turns between one desire and another between good and evil. As for its parts, it consists of four main parts called chambers, two rooms on the right As for the two chambers below, it is called the ventricle, the heart works regularly and accurately to pump blood and distribute it to all parts of the body and vital organs. And the Holy Quran divided the types of heart into two main types of healthy hearts, which are types (healthy, hidden, living....)

And the second type is sick hea

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Haughtiness and the Humility in Al Koran
...Show More Authors


Abstract
What the research come to:
1- The presentation of the image of the proud person in this
mortal life appeared in several styles such as (conversation)
arousing the insert once and convincing in other time,
(confirmation) in all its types، (argument) scolding with the
gradual progress of time of the discourse .Interview and
parallelism are two of these styles with the presences of the
repetition style especially in the topics that has a reference to
the theme of (pride) being implied not directly stated. The
Koran discourse varied in its reference to the theme of pride
according to the context which is mentioned directly
(eighteen times) which formed one third of the number of

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 21 2024
Journal Name
Pharmacia
Synthesis and biological activity evaluation of new isatin-gallate hybrids as antioxidant and anticancer agents (in vitro) and in silico study as anticancer agents and coronavirus inhibitors
...Show More Authors

Background: The hybrid compounds hold promise for developing novel pharmaceuticals, potentially exhibiting greater activity, mainly against viruses and cancer diseases, than their components.

Objective: In this study, researchers explored the potential synergistic effects of hybrid molecules by designing and synthesizing a series of isatin-gallate hybrids, denoted as N’-(5-substituted-2-oxoindolin-3-ylidene)-3,4,5-trihydroxybenzohydrazide (3a–d).

Methods: Isatin-gallate hybrids (3a–d) were synthesized by reacting gallic hydrazide with each of the isatin analogs (2a–d). The structures of all produced comp

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2017
Journal Name
Al-mustansiriyah Journal Of Science
Synthesis, characterization and antibacterial Evaluation for mixed-ligand Complexes of Nickle (II), Manganese (II), Copper (II), Cobalt (II) and Mercury (II) with Tetradentate
...Show More Authors

Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM: THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM
...Show More Authors

One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of a​​mobile slaughterhouse to reduce this phenomen

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref