The bilateral sagittal split osteotomy (BSSO) is the most popular orthognathic procedure performed by maxillofacial surgeons to treat skeletal class II and class III and to correct mandibular asymmetries. The study aimed to evaluate the lingual splitting patterns and lateral bone cut end (LBCE) in bilateral sagittal split osteotomy (BSSO) and their relation with the ramal thickness and the presence of impacted third molars using cone beam computed tomography (CBCT). This prospective observational study included patients with mandibular prognathism who were treated with BSSO with or without Le Fort I osteotomy. Cone beam computed tomography was used to measure the ramal thickness preoperatively and to evaluate the LBCE, and the lingual splitting patterns postoperatively. Twenty-one patients (42 sides) were included in this study. The most commonly observed lingual splitting pattern was type III (47.6%), while the most common LBCE was type B (59.5%). The bad split was encountered 8 times on 42 sides (16.7%). A nonsignificant relationship between the ramal thickness and bad splitting was observed (
summary of the research
The heart is the pine-shaped flesh on the left side of the chest. The moral gentleness in this flesh is called the home of perception, reason and understanding, as well as the place of desires and passions, so it turns between one desire and another between good and evil. As for its parts, it consists of four main parts called chambers, two rooms on the right As for the two chambers below, it is called the ventricle, the heart works regularly and accurately to pump blood and distribute it to all parts of the body and vital organs. And the Holy Quran divided the types of heart into two main types of healthy hearts, which are types (healthy, hidden, living....)
And the second type is sick hea
... Show More
Abstract
What the research come to:
1- The presentation of the image of the proud person in this
mortal life appeared in several styles such as (conversation)
arousing the insert once and convincing in other time,
(confirmation) in all its types، (argument) scolding with the
gradual progress of time of the discourse .Interview and
parallelism are two of these styles with the presences of the
repetition style especially in the topics that has a reference to
the theme of (pride) being implied not directly stated. The
Koran discourse varied in its reference to the theme of pride
according to the context which is mentioned directly
(eighteen times) which formed one third of the number of
One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of amobile slaughterhouse to reduce this phenomen
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More