Background: Temporomandibular joint (TMJ) is a compound articulation formed from the articular surfaces of the temporal bone and the mandibular condyle.CBCT imaging of TMJ is that it allows accurate measurements of the volume and surface of the condyle. The aim of the study is to assess the sagittal position of mandibular condyle in patients with temporomandibulardysfunction using Cone Beam Computed Tomography in centric occlusion. Materials and Methods: CBCT images for all patients were obtained in an upright position using New Tom Giano CBCT with different field of view (11 x 8), (11 x 5), and (8 x 8) and exposure factors was changed accordingly using NNT version 5.1 software for sagittal reconstruction, anterior, superior and posterior joint spaces was measured. Results: There was a significant change in the anterior, posterior and superior joint spaces when compared to normal functioning TMJ. The sagittal position of the condyle in glenoid fossa could be affected by TMJ dysfunction and it would be positioned centrally but slightly inferior to the normal position according to the results of this study. There was no significant difference in the sagittal condylar position in glenoid fossa between sexes. There was significant difference in the value of anterior, posterior and superior TMJ spaces between right and left sides of the mandible in both normal cases and TMJD. Conclusion: Sagittal section of Temporomandibular joint revealed that TMJ dysfunction affects the joint spaces in sagittal plane. It means significant changes occur in the value of anterior, posterior and superior joint spaces when compared to normal functioning TMJ.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreBackground Psoriasis is one of the most prevalent chronic inflammatory skin conditions; its prevalence ranges from 1 to 3%. Tumor necrosis factor-alpha (TNF-α), a cytokine that enhances inflammation, is overexpressed in synovium and skin plaques in psoriasis. TNF-α plays a critical role in the pathogenesis of psoriasis. IL-10 is the most crucial cytokine for reducing excessive immune responses and decreasing pro-inflammatory reactions in all autoimmune disorders. Objective To evaluate the effect of Apremilast on ILـ10, TNFـα, and BMI in obese psoriatic patients. Methods Thirty patients included in this investigative study to measure the concentrations of TNFـα, ILـ10 and BMI, before and after receiving Apremilast. TNFـα and
... Show MoreBreast cancer (BC) is first of the top 10 malignancies in Iraq. Dose‐volume histograms (DVHs) are most commonly used as a plan evaluation tool. This study aimed to assess DVH statistics using three‐dimensional conformal radiotherapies in BC in an adjuvant setting.
A retrospective study of 70 histologically confirmed women diagnosed with BC was reviewed. The study was conducted between November 2020 and May 2021, planning for treatment with adjuvant three‐dimensional conformal radiotherapies. The treatment plan used for each woman was based on an analysis of the volumetric dose, inclu
In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
Frustrated Total Internal Reflection FTIR phenomenon is manifested employing Newton‟s rings setup generated via a coherent light beam of a laser diode ( . All concentric bright and dark rings, except the central bright spot, were noticed to recede (disappear) when the incident angle exceeded the critical angle of 41o.
It was also shown that the current setup has proven its applicability for other tests and can give convenient results that conform with theory. Neither the concept nor the design is beyond what can be realized in an undergraduate laboratory. However, technical improvements in mounting the prism - lens may be advisable. As an extension of the experiments, the effect can be studied using hollow prism filled with liquids
A cantilever beam is made from composite material which is consist of (matrix: polyester) and (particles: Silicon-Carbide) with different volume fraction of particles. A force is applied at the free end of beam with different values. The experimental maximum deflection of beam which occurs at the point of the applied load is recorded. The deflection and slope of beam are analyzed by using FEM modeling. MATLAB paltform is built to assemble the equations, vector and matrix of FEM and solving the unknown variables (deflection and slope) at each node. Also ANSYS platform is used to modeling beam in finite element and solve the problem. The numerical methods are used to compare the results with the theoretical and experimental data. A good ag
... Show MoreIn this work the analysis of laser beam profile system ,using a two dimensional CCD (Charge Coupled Device) arrays, is established. The system is capable of producing video graphics that give a two dimensional image of laser beam. The video graphics system creates color distribution that represent the intensity distribution of the laser beam or the energy profile of the beam. The software used is capable of analyzing and displaying the profile in four different methods that is , color code intensity contouring , intensity shareholding, intensity cross section along two dimension x-y, and three dimensional plot of the beam intensity given in the same display.
Background: Orthodontic mini-implants are increasingly used in orthodontics and the bone density is a very important factor in stabilization and success of mini-implant. The aim of this study was to observe the relationship among maximum bite force (MBF); body mass index (BMI); face width, height and type; and bone density in an attempt to predict bone density from these variables to eliminate the need for CT scan which have a highly hazard on patient. Materials and Methods: Computed tomographic (CT) images were obtained for 70 patients (24 males and 46 females) with age range 18-30 years. The maxillary and mandibular buccal cortical and cancellous bone densities were measured between 2nd premolar and 1st molar at two levels from the alveol
... Show More