Background: presence of lingual vascular foramina and canals in the interforaminal regionmay increase the risk ofsurgical complications during implant placement or any surgical procedure in this area.Aim of this study is the radiological evaluation of the anatomic characteristic of the lingual foramina and their vascular canals in the anterior of the mandible using cone beam computed tomography. Materials and Methods: Prospective study including 72 Iraqi subjects (31 male and 41 female) ranging from 20 to 59 years, all subjects attended AL- Sharaa dental clinic in AL-Najaf AL-Ashraf city, scanned with CBCT from September 2016 to February 2017. Using 3dimentional and sagittal cross section to detect lingual foramina and their vascular canals. Their presence, number, diameter, position, and orientation were established. Results: Lingual foramina in the anterior mandible were viewed in whole sample. Number of lingual canals varied from (1-5), the average diameter of the canals was (0.81 mm). The average distance from the foramina to the base of the mandible and to the alveolar crest was (13.78 mm) and (16.05mm), respectively. There was no significant correlation found between age and gender on all selected measurements. There was significant association of diameter of lingual foramen with the count, situation, extent and direction of lingual canal through the mandible width. Conclusion: Cone beam computed tomography is an invaluable system in diagnosis and treatment planning of surgical procedures. It help in detection of various anatomic features of mandible like presence of lingual foramen and canals in the anterior mandible.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreBackground: Different diagnostic definition and criteria have been recommended by different expert groups for the diagnosis of metabolic syndrome, however, it’s prevalence in the same population could differ depending on the definition used yielding different results. In Iraq, there is a lack of research comparing these different diagnostic definitions. Objective: To find out the most suitable metabolic syndrome definition to be used for Iraqi people. Methods: 320 participants were recruited for this study, 53.4% men and 46.6% women, aged between 25-85 years, visiting Baghdad Teaching Hospital, the prevalence of metabolic syndrome according to different definitions were compared and the agreement was assessed by the Kappa st
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThis study aimed to reveal the stage for teachers of basic training needs from the perspective of workers in Mafraq Governorate, through a survey of a sample of counselors look at the Ajloun area schools reached (58) counselors.
To achieve the objective of the study was constructed questionnaire where they are finalized (18) items distributed on two dimensions (professional needs, performance requirements) and after confirmation of the validity and reliability have been applied to the sample where the results showed that training needs were high, both on a professional or per formative level .
The results also showed no statistically significant differences in the areas of tool due to gender, educational qualification. The study co
Although the events of September 2001 marked the United States' employment of solid forces in its direct comprehensive strategy to counter terrorist organizations and any other challenges to US national security, the United States did not lose sight of the importance of the cultural variable. The cultural variable is the United States' most important instrument of soft power in ensuring its dominance of the international system and promoting its global project. France viewed US soft power as a threat to its own civilizational pattern. Therefore, France considers culture to be an inherent component of its national personality and a cornerstone of its international standing as a major force. Additionally, the US-French political and economic
... Show MoreThe Purpose of this research is analysis and discussion " The Effect of Insurace Company Capital Adequacy in it’s Profitafility: An Empirical Study compared the two insurance (national, Iraqi), for a period of one year (2005) and the year (2014), as it is framed theoretical side for two topics head adequacy money the insurance company, and the profitability of the insurance company, and I've been using the research methodology and analytical, in the analysis and measurement of the capital of the insurance company adequacy, and profitability of the company, as the capital adequacy ratio was measured by dividing the total capital available on the total capital rate risk, after measured and appreciated in two insurance research, while I u
... Show MoreThe research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.
This research was carried out to reveal the the technique of the recitation in this story including a preface, introduction, two chapters and the conclusion. the introduction consisted of the problem, significance , purpose and limitations of research. The preface included two paragraphs. The first included a meta-recitation of terminology and semantic. The second paragraph devoted to show the cultural identity of Hussein Rahim. The first chapter aimed to reveal the reality and the imaginary in the story of Na'lat Al Hakawaty (storyteller's curse). The second chapter aimed to study the strange arguments in the story. The research concluded the conclusion by presenting the results for attaching them with the margins, and the references
... Show More