Background: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the maxilla and mandible were (20) lesions. Statistical analysis of the collected data showed no significant differences between the radiographical records and surgical findings regarding diagnostic accuracy of the lesions. Conclusion: The validity of the CBCT in the assessment of maxillofacial cystic and cystic like lesions was similar to the surgical findings regarding lesion extension, expansion, perforation of buccal/or lingual plates, and relation to the adjacent vital structures
In this paper, we introduce new classes of sets called g *sD -sets , g *sD −α -sets , g *spreD − sets , g *sbD − -sets and g *sD −β -sets . Also, we study some of their properties and relations among them . Moreover, we use these sets to define and study some associative separation axioms .
The development of human resources training programs can assist in agreat deal in creating products of high quality with quantitive advantage for the economicunit;through the sale of products by prices higher of the peer products price in the arket,or decreasing production costs which lead into increusing the unet profits. for these reasons, the human resources have got great importance for their great role in any economy,and they havestarled to consentrate on accounting these resource.From this point of view, this research has handied human resources accounting and their effect on quality costs. In(MID-Refinery Company),quality costs are determined ,then we have larified the reality of training and development in the o
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreAbstract Globalization dominated in the last decade of the twentieth century and the eve of the third millennium over economic,politics,psychology,culture,communications and information sciences,it's a historical phenomenon refer to many important transitions in humanitarian life.It foxes on that state has illusion its historical role in the psychologist,economic and political buldings. Globalization issue and its influence in North Korea put a spotlight on political,economic and cultural situations,the political system resists any change with many limitations on political freedoms,human rights and political multiplicity.Libralism trends and free market are so weaken when it comparing within the bad economic situation of the coun
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
Islam was keen to get every man and woman a share of those benefits and wanted to marry and urged him. In order to unite efforts and articulates the arrow and clarifies the goal and I have a share in building a sober Islamic society, for all this and other research title is ((modern or planting and its impact on marital happiness)).
The research aims to release the concept of auditing reporting and its role in the rationalization of economic decisions in the companies listed in the Iraq Stock Exchange from the viewpoint of academics, professionals, investors and lenders. Auditor reporting witnessed the great progress in many areas addressed many of the previous studies compare with Iraqi auditors reporting because there are some defects in these aria .The research problem focused whether the auditor report in Iraq is contains useful information to rationalize investment decisions & lending decisions in the shareholding companies listed on the Iraq Stock Exchange , and under that premise , " There is statistically significant relationship between the reporting au
... Show MoreImage fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,
... Show MoreThe research tagged (functional enhancement and its reflection on industrial product systems) focused on the possibility of enhancing industrial products in terms of form and functionality in a way that they are able to meet the needs of the user through the impact of technology and modern technologies on the functional enhancement of industrial products and their effectiveness in achieving formal and functional design variables, and producing products Industrial products are highly efficient and durable in order to improve them in order to meet the needs of the user, the transfer of technology between life forms and industrial products is desirable because the functional enhancement processes that occurred in general on industrial produ
... Show MoreLike the digital watermark, which has been highlighted in previous studies, the quantum watermark aims to protect the copyright of any image and to validate its ownership using visible or invisible logos embedded in the cover image. In this paper, we propose a method to include an image logo in a cover image based on quantum fields, where a certain amount of texture is encapsulated to encode the logo image before it is included in the cover image. The method also involves transforming wavelets such as Haar base transformation and geometric transformation. These combination methods achieve a high degree of security and robustness for watermarking technology. The digital results obtained from the experiment show that the values of Peak Sig
... Show More