Background: Posterior superior alveolar artery (PSAA) is branch of the maxillary artery. It usually supplies the lateral wall of the sinus and overlying membrane. Evaluation and awareness of the anatomy of maxillary sinus before surgery is crucial to avoid surgical complications. The aim of this study is to examine the prevalence, location of the (PSAA) in relation to the floor of the maxillary sinus and alveolar crest using computerized tomography (CT) scans. Materials and Methods: This study included 180 Iraqi subjects (99 males and 81 females) with age more than 16 years old. CT scans for (right and left) Maxillary sinuses were done for each patient. The information obtained was assessed in a coronal multi planar reconstructions images (MPRs) in order to obtain the following parameters: prevalence rate of PSAA, distance from the lower border of the artery to the: alveolar crest, the floor of the sinus and the medial sinus wall. Results: The prevalence of PSAA on CT images was 73.61% among total sample. Distance from the lower border of the artery to the alveolar crest was (18.42± 4.07) mm, and to the sinus floor was (8.99 ±3.86) mm and to the medial sinus wall was (12.68 ± 2.81) mm. Conclusions: CT scan is valuable tool in evaluation and localization of the PSAA before maxillary sinus surgery.
Objective: Pregnancy-induced hypertension (PIH) is a major pregnancy complication that leads to maternal mortality. Here, we have scrutinized the correlation between serum levels of hydrogen peroxide (H2O2) and superoxide dismutase (SOD) in PIH.Methods: Serum samples were collected from 80 Iraqi women (40 women with PIH as patients group, 20 normotensive pregnant women as a positive control, and 20 normotensive non-pregnant women as a negative control) all groups were diagnosed clinically.Results: Serum of H2O2 and SOD levels was measured for all studied groups. Results showed that there were no significant variances in age and gestational age distribution between all studied groups. Furthermore, result showed that the serum level o
... Show MoreThe Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie
... Show MoreThe aim of this paper is to construct the (k,r)-caps in the projective 3-space PG(3,p) over Galois field GF(4). We found that the maximum complete (k,2)-cap which is called an ovaloid , exists in PG(3,4) when k = 13. Moreover the maximum (k,3)-caps, (k,4)-caps and (k,5)-caps.
Type 2 diabetes mellitus (T2DM) is the most frequent endocrinal disease commonly associated with thyroid disorders .The study is conducted at the Specialized Center for Endocrinology and Diabetes in Baghdad ,during December 2014 up to October 2015.This study was done to investigate the prevalence of anti- thyroid peroxidase (Anti-TPO) antibody in patients suffered from type 2 diabetes with thyroid disorders .The study groups included a total number of 80 subjects consisting of 60 type 2 diabetic patients divided into 20 hyperthyroidism subjects (group 1) ,20 hypothyroidism subjects (group 2), 20 euthyroidism subjects (group 3) and 20 healthy controls (group 4) . The fasting blood samples were analyzed for (T3,T4,TSH) by using Vitek Immuno d
... Show More(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More