Background: lip lengthening procedure is one of the surgical options for the correction of gummy smile in patients with short upper lip. Methods: A comparative clinical study was conducted on 15 patients requiring lip lengthening procedure for the esthetic correction of excessive gingival exposure with gummy smile. Scalpel was used in seven patients and diode laser in the remaining eight patients. Under infiltration anesthesia, about one cm strip of mucosa was excised at the vestibular depth and the mucosa of the lip was sutured to the alveolar mucosa. Results: The diode laser group demonstrated less postoperative pain and swelling. Regarding postoperative ecchymosis, three patients in the scalpel group developed ecchymosis and no cases were noted in the laser group, the difference was statistically significant. No patient in the laser group developed wound dehiscence and only one patient in the scalpel group had wound dehiscence at third postoperative day. Observed at one month postoperatively, the laser treated groups had less obvious scar than the scalpel group. Conclusion: Diode laser is a valuable tool in performing lip lengthening for gummy smile.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThis research aims to develop new spectrophotometric analytical method to determine drug compound Salbutamol by reaction it with ferric chloride in presence potassium ferricyanide in acid median to formation of Prussian blue complex to determine it by uv-vis spectrophotmetric at wavelengths rang(700-750)nm . Study the optimal experimental condition for determination drug and found the follows: 1- Volume of(10M) H2SO4 to determine of drug is 1.5 ml . 2- Volume and concentration of K3Fe(CN)6 is 1.5 ml ,0.2% . 3- Volume and concentration of FeCl3 is 2.5ml , 0.2%. 4- Temperature has been found 80 . 5- Reaction time is 15 minute . 6- Order of addition is (drug + K3Fe(CN)6+ FeCl3 + acid) . Concentration rang (0.025-5 ppm) , limit detecti
... Show MoreAn Expression for the transition charge density is investigated
where the deformation in nuclear collective modes is taken into
consideration besides the shell model transition density. The
inelastic longitudinal C2 and C4 form factors are calculated using
this transition charge density for the Ne Mg 20 24 , , Si 28 and S 32
nuclei. In this work, the core polarization transition density is
evaluated by adopting the shape of Tassie model togther with the
derived form of the ground state two-body charge density
distributions (2BCDD's). It is noticed that the core polarization
effects which represent the collective modes are essential in
obtaining a remarkable agreement between the calculated inelastic
longi
The compressive residual stresses generated by shot peening, is increased in a direct proportional way with shot peening time (SPT). For each metal, there is an optimum shot peening time (O.S.T) which gives the optimum fatigue life. This paper experimentally studied to optimize shot peening time of aluminium alloy 6061-T651 as well as using of and analysis of variance (ANOVA).
Two types of fatigue test specimens’ configuration were used, one without notch (smooth) and the other with a notch radius (1,25mm), each type was shot peened at different time. The (O.S.T) was experimentally estimated to be 8 minutes reaching the surface stresses at maximum peak of -184.94 MPa.
A response surface methodology (RSM) is presen
... Show MoreNatural gas and oil are one of the mainstays of the global economy. However, many issues surround the pipelines that transport these resources, including aging infrastructure, environmental impacts, and vulnerability to sabotage operations. Such issues can result in leakages in these pipelines, requiring significant effort to detect and pinpoint their locations. The objective of this project is to develop and implement a method for detecting oil spills caused by leaking oil pipelines using aerial images captured by a drone equipped with a Raspberry Pi 4. Using the message queuing telemetry transport Internet of Things (MQTT IoT) protocol, the acquired images and the global positioning system (GPS) coordinates of the images' acquisition are
... Show MoreA modified chemical method was used to prepare titanium dioxide nanoparticles (TiO2 NPs), which were diagnosed by several techniques: X-ray diffraction, Fourier transform infrared, field emission scaning electron microscopy, energy disperse X-ray, and UV-visible spectroscopy, which proved the success of the preparation process at the nanoscale level. Where the titanium oxide particles have an average particle size equal to 6.8 nm, titanium dioxide particles were used in the process of adsorption of Congo red dye from its aqueous solutions using a batch system. The titanium oxide particles gave an adsorption efficiency of Congo red dye up to more than 79 %. The experimental data of the adsorption process were analyzed with kinetic models and
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More