Background: To evaluate the bony supports of the teeth adjacent to the area of cleft in patient with unilateral cleft lip and palate and to compare these measurements with the measurements of the same teeth in non-cleft side by using CBCT. Materials and methods: The CBCT scans of 30 patients having cleft lip( unilateral) and palate(unilateral), were analyzed and the measurements of the alveolar bony support for teeth that are adjacent to the cleft area were measured with those teeth located on opposite side (non- clef) side. For each tooth, the measurements will taken for the distance between the( cementoenamel junction) (CEJ) and the bony crest (AC) at the( buccal area) was measured and the thickness of the buccal plate At zero, one, two, and four mm. Results: The thickness of the bony support of central incisor at zero and one mm apically were statistically significantly thinner in cleft regions than in the non cleft regions. The CEJ-AC distance of the central teeth that are adjacent to the area of cleft was higher significantly than those for non-cleft area. For the canine teeth at 0, 1, 2, and 4mm apically were similar to those results obtained for central teeth at 0 and 1mm levels. Also, the CEJ-AC distance of the canine teeth that are adjacent to the cleft area was higher significantly than those for non-cleft area. Conclusion: person with unilateral cleft lip and palate showed a reduced alveolar bony support of the teeth located adjacent to the area of cleft when compared with the controls and This will cause a lot of problems in the future, so professional dental control is very essential for the maintaining of good periodontal health for those patients
<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreCopula modeling is widely used in modern statistics. The boundary bias problem is one of the problems faced when estimating by nonparametric methods, as kernel estimators are the most common in nonparametric estimation. In this paper, the copula density function was estimated using the probit transformation nonparametric method in order to get rid of the boundary bias problem that the kernel estimators suffer from. Using simulation for three nonparametric methods to estimate the copula density function and we proposed a new method that is better than the rest of the methods by five types of copulas with different sample sizes and different levels of correlation between the copula variables and the different parameters for the function. The
... Show MoreToday, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show MoreThe Iraqi political and social arena has been characterized, subjectively and objectively, by the weakness of leadership building. This has led to a leadership crisis, which is reflected in the quality of the outcome of the process of rebuilding the state in Iraq. Thus, this building process has lacked the simplest requirements and conditions of success. It has suffered from a major and obvious failure: the situation in Iraq has raised conflict leaders, not constructive leaders, and this confirms the existence of a cultural crisis in the production of conscious, aware leadership compatible with democratic action. The weakness of leadership in Iraq is reflected in a series of ongoing crises that require radical solutions in accordance with l
... Show MoreAbstract:
Objective: The study was done to evaluate nurses’ knowledge and practices toward physical restraint at critical care unit
Methodology: Fifty nurses, who were selected by a non-probability (convenient) sampling method, participated in this descriptive study. The instrument of the study was knowledge parts of the questionnaire were initially developed in the U.S.A for nursing homes; in 2006 they were adopted for all hospital units by the original developers. The knowledge section of the questionnaire consisted of 20 items, which were used to measure knowledge of nurses towards the definition, indications and contra
... Show MoreThis study assesses the short-term and long-term interactions between firm performance, financial education and political instability in the case of Malaysia Small to Medium Enterprises (SMEs). The simultaneous insertion of financial education and political instability within the study is done intentionally to inspect the effect of these two elements in one equation for the Malaysian economy. Using the bound testing methodology for cointegration and error correction models, advanced within an autoregressive distributed lag (ARDL) framework, we examine whether a long-run equilibrium connection survives between firm performance and the above mentioned independent variables. Using this method, we uncover evidence of a positive long-term link b
... Show MoreToday, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.
Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology
... Show More