Background: Because of its clinical and surgical importance and lack of precise information about this rare and important anatomical landmark, this study was designed to detect the presence, configurations and length of Mandibular Retromolar Canal (MRMC) with aid of CBCT visualization. Materials and methods: In this retrospective study the data was obtained from Specialist Health Center in AL-Sadder city in Baghdad for (100) patients with 200 inferior dental canal, all of them referred to CBCT scan (Kodak 9500, French origin). The scanning was done with tube voltage 90 kVp, tube current with 10mA and exposure time was 10 s., the field of view was measured with 5cm x 3.7cmwith 0.03mm voxel size Results: In the present study the prevalence of MRMC was 12% , 2 patients have ( two ) bilateral MRMC and 10 patients have a unilateral canal, there was asignificant difference between two sides (left and right), the right side was 64.29% and left 35.71%, regarding to gender also there was a significant difference , female 33.3% and male 66.7%. In this study there were three types of MRMC and there was a significant difference between them, the mean length (hight) was 11.78 mm and mean horizontaldistance from canal to distal surface of the second molar was 18.5 mm. Conclusions: MRMC also detectedin this study within the global percentage and configurations and should be taken with consideration in oral surgical procedures and radiological interpretations
Peripheral artery disease (PAD) is associated with increased oxidative stress and impaired endothelial function. Ticagrelor treatment improves antioxidant properties in addition to its antiplatelet effects. This study investigated the impact of Ticagrelor treatment on serum superoxide dismutase (SOD) levels and other biochemical parameters in PAD patients. It also evaluated the potential diagnostic accuracy and clinical utility of specific biomarkers based on receiver operating characteristic (ROC) analysis. Seventy individuals were categorized into healthy control (n=40), baseline PAD patients not on Ticagrelor (B-PAD, n=30), and same PAD patients after treated with Ticagrelor (A-PAD, n=30). Parameters measured included SOD concent
... Show MoreBackground: psychiatric and behavioral side effects are
common in patients with epilepsy and it may represent an
intrinsic feature of the disease itself or a side effect of the
antiepileptic use. Our aim in the present study is to assess
the psychiatric side effects of Sodium Valproate and
Carbamazipine .as these drugs are the most commonly
used antiepileptic drugs in Iraq.
Methods: 80 patients with primary generalized epilepsy
on Carbamazipine and 50 patients on Sodium Valproate
were enrolled in the present study; all the patients were
assessed for any psychological disturbances using semistructural interview based on the tenth edition of the
international classification of the diseases(ICD 10)
adopte
To study the effect of iron overload due to continuous blood transfusions on peroxidation products, such as malondialdehyde (MDA) and peroxynitrite, with evaluation of some antioxidants like, glutathione (GSH), superoxide dismutase (SOD), vitamin A, vitamin C, vitamine E, Ceruloplasmin, uric acid and albumin in thalassemia patients. Forty patients with thalassemia major, aged 5 to 15 years, were carried out in Abn-Alatheer Teaching Hospital in Mosul city, during the period from October 2007 to April 2008. They were on Chelation therapy with desferÂrioxamine. They were divided into two groups, the first one without iron overload (90,97±12.92), and the second one with iron overload (157.75±7.57). All the patien
... Show MoreThe Machine learning methods, which are one of the most important branches of promising artificial intelligence, have great importance in all sciences such as engineering, medical, and also recently involved widely in statistical sciences and its various branches, including analysis of survival, as it can be considered a new branch used to estimate the survival and was parallel with parametric, nonparametric and semi-parametric methods that are widely used to estimate survival in statistical research. In this paper, the estimate of survival based on medical images of patients with breast cancer who receive their treatment in Iraqi hospitals was discussed. Three algorithms for feature extraction were explained: The first principal compone
... Show More The research addresses the most important elements of the ancient Iraqi heritage represented by architecture and plastic arts being the direct means that preserved the heritage due to the ease of preserving them and the speed of circulating them and diversity of their topics. Through the features of these elements, the research problem has been defined in the form of questions including: what are the most important elements of the ancient Iraqi heritage? What are the plastic arts? What are the most important topics adopted? What is the concept of palm in the ancient Iraqi heritage? What is the evidence for that?
Has it been employed in the Iraqi contemporary art? What is the evidence for that? How to employ it in the arts and t
Means the current research to study the organization formal and its role in demonstrating aesthetic values of the publications issued by the Telecommunications Company (Asia Cell) in Iraq, where is the organization the formal need for a mission to find the concepts and dimensions of the functional and expressive and aesthetic added to the impact of the actor in achieving the goals set for the publication.
The target is determined by the researcher to disclose the role of formal organization to show the aesthetic values of the publication to reach scientific results
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreRadiation measuring devices need to periodic calibration process to examine their sensitivity and the extent of the response. This study is used to evaluate the radiation doses of the workers in the laboratories of the Directorate of Safety as a result of the use of point sources in calibrating of the devices in two ways, the first is the direct measurement by the FAG device and the others using RESRAD and RAD PRO programs. The total doses values using FAG were (2.57 μSv/y, 102.3 μSv/y and 20.75 μSv/y for TLD laboratory, Gamma spectroscopy analyses (GSA) laboratory and equipment store respectively, and the total doses that calculated using RESRAD and RAD PRO were 1.518 μSv/y, 76.65 μSv/y and 21.2 μSv/y for the above laboratories. t
... Show MoreObjectives: To assess pregnant women’s knowledge regarding syphilisand to find out the relationship between women’s knowledge regarding syphilis infection and demographic and reproductive variables. Methodology: A descriptive analytical study of non probable (purposive sample) of 250 pregnant women during their different gestational ages for the period (October 2nd to April 25th 2013) by using questionnaire format consists of demographic variables and items of women's knowledge regarding syphilis who are visiting primary health care centers in Al-Kharkh and Al-Rrusafa in Baghdad city. The coefficient relia
Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More