Background: Complete analysis of facial profile should also include an evaluation of soft tissue morphology. Materials and Method:The sample consisted of 90 Iraqi adults (45 males and 45 females) aged 18-25 years from Baghdad city divided into 3 groups according to the ANB angle with 30 subjects in each group (15 males and 15 females) for class I, II and III. Lateral cephalometric radiograph was taken for each subject and 8 angular and 5 linear measurements were identified and determined, t-test, ANOVA and LSD test were used to compare between both genders and between different classes. Results:Showed that females had greater angular measurements and smaller linear measurements with more lip prominence than males in all classes, there was more convex facial profile with more prominent forehead, more prominent tip of the nose with increased facial heights and more prominent lips in class II subjects than in class I and IIIsubjects. Conclusion: There is wide variation in soft tissue facial profile among different classes of malocclusion and careful determination of the components of soft tissue facial profile is very important in the diagnosis and treatment planning.
Specialized Escherichia coli (E. coli) isolates, called uropathogenic E. coli (UPEC), cause most of urinary tract infections (UITs). Once bacteria reached the urinary tract of the host, they have to adhere to the host cell for the colonization. For this purpose, bacteria have different structures including fimbrial adhesins. Most of the UPECs contain type 1 fimbriae encoded by fim operon (fimB, E, A, I, C, D, F, G, H) which is responsible for the adhesive ability in these isolates. Ninety-four isolates of UPEC were obtained from UTI patients in Baghdad hospitals and their diagnosis were confirmed by the PCR method using 16srDNA as a housekeeping gene. The UPEC isolates were tested for their ability of adherence to the urothelial cells obtai
... Show MoreThe thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreDust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreThe method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search the comparison between binary lo
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More