Background: Asymmetry assessment is an important component of orthodontic diagnosis and treatment planning. Several studies attempted to find the relationship between craniometric asymmetry and skeletal jaws relationship and many authors found some extent of asymmetry in individuals with normal jaws relationship. The use of Computed tomography (CT) allows for the assessment of asymmetry on a dimensionally accurate volumetric image, aim of the study is to determine if there are differences in craniometric asymmetry between patient with skeletal class I and patients with skeletal class II relationship using Helical CT scan. Materials and Methods: Ninety individuals with clinically symmetrical faces were imaged with Helical CT scan, and aging 18-35 years, divided into two groups, class ? group consisted of 31 individuals and class ?? group consisted of 59individuals. Anatomical landmarks were defined and reference planes were established to determine the variance of the landmarks using a coordinate plane system. Sagittal radiographs were used to determine the amount of the ANB angle. Asymmetry was analyzed by calculating the linear measurements and asymmetry indices of the anatomical landmarks by using coronal and axial radiographs in both classes. Results: Clinically symmetrical faces demonstrated a computed tomographic significant asymmetry with the vertical dimensions being significantly larger than the bilateral dimensions and the amount of asymmetry was more at the level of the mandible and less at the maxillary area. Conclusions: The craniometric structures in terms of size and shape were larger in males than in females. The amount of asymmetry was independent on gender and skeletal jaws relationship and age.
Solar energy is still commonly used to produce clean drinking water due to its simple construction, low maintenance, and ecofriendliness. This work aims to experimentally investigate the yield upgrade and the thermal performance of a novel concentrated single‐axis tracking trough tubular solar still (TSS). This tubular still is identified by three baffles that generate four interrupted sections in the U‐receiver, which is inserted with copper mesh and fitted in a hexagonal‐shaped glass cover. Two identical TSS models were side‐by‐side outdoor tested in Baghdad‐Iraq 33.3° N and 43.3° E from January to March 2024. The first is inserted with black copper mesh (Model I), and the other h
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.