Background: Posterior superior alveolar artery (PSAA) is branch of the maxillary artery. It usually supplies the lateral wall of the sinus and overlying membrane. Evaluation and awareness of the anatomy of maxillary sinus before surgery is crucial to avoid surgical complications. The aim of this study is to examine the prevalence, location of the (PSAA) in relation to the floor of the maxillary sinus and alveolar crest using computerized tomography (CT) scans. Materials and Methods: This study included 180 Iraqi subjects (99 males and 81 females) with age more than 16 years old. CT scans for (right and left) Maxillary sinuses were done for each patient. The information obtained was assessed in a coronal multi planar reconstructions images (MPRs) in order to obtain the following parameters: prevalence rate of PSAA, distance from the lower border of the artery to the: alveolar crest, the floor of the sinus and the medial sinus wall. Results: The prevalence of PSAA on CT images was 73.61% among total sample. Distance from the lower border of the artery to the alveolar crest was (18.42± 4.07) mm, and to the sinus floor was (8.99 ±3.86) mm and to the medial sinus wall was (12.68 ± 2.81) mm. Conclusions: CT scan is valuable tool in evaluation and localization of the PSAA before maxillary sinus surgery.
Abstract: Persian literature, after the spread of Islam in Pars, received a lot of influence from the subtle and rhetorical details of the Holy Quran. This effect is more in poetry than in prose because the weights of Persian poetry are closer to the melody of the Qur'an and its weights.The effectiveness of most of the prose works is only in the Quranic themes and words. Persian poetry that has benefited from various sciences of rhetoric, including semantics, eloquence and rhetoric. The degree and manner of influence of each of the didactic, lyrical, epic and travelogue literary types is different from the rhetorical points of the Quran. The instructions under educational literature have benefited the least from Quranic rhetoric. The max
... Show MorePersuasion is an indispensable skill in everyday life; that is why, it has aroused researchers’ interest. This study aims to investigate the most frequently used persuasive strategies in texting WHO COVID-19 Virtual Press Conferences and explore how these strategies are employed to achieve persuasive messages.To this end, a text of WHO COVID-19 Virtual Press Conferences has been chosen randomly to be analyzed based on Dillard and Shen’s (2013) “Persuasive strategies in Health Campaigns”. A qualitative method has been adopted in analyzing the selected data to investigate the credibility and validity of the persuasive strategies used in such a domain. Findings have shown that most of the persuasive appeals based on the adopted mode
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreThis research contributes to environmental sustainability by recycling natural waste resources in making clothing products. The research aims to employ palm trees waste in designing belts suitable for contemporary women's fashion trends. Both descriptive and applied research approaches were used. Therefore, a collection of belts was designed and implemented. Then, a questionnaire was used to assess the extent to which the implemented belts achieved in sustainability standards using Likert scale. The sample size was 60 women. The data were analyzed using the SPSS program to calculate the arithmetic mean and standard deviation. One of the significant results of the research is the high average scores of the criteria for achieving sustainab
... Show MoreTo evaluate the toxicity of benzalkonium chloride in aquaculture, the hemato-serological indices of Nile tilapia Oreochromis niloticus are used as biomarkers. Following exposure to three concentrations of benzalkonium chloride BAC 0.1, 0.25, 0.50, and 1 mg/l (BAC1,2,3 and 4) in aquaria for two durations 21 and 42 days, the microbiological assay in fish aquaria, in addition to blood parameters were assessed. Except for the mean difference between BAC2 and BAC3 (P > 0.05) at 42 days, the mean values of the bacterial counts revealed a significant difference between all compared groups (0.05 ≥ P ≤ 0.01). Following exposure to the lower concentrations of BAC (1, 2 and 3), the main blood parameters of Oreochromis niloticus namely red bl
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More