Background: Implant stability is a mandatory factor for dental implant (DI) osseointegration and long-term success. The aim of this study was to evaluate the effect of implant length, diameter, and recipient jaw on the pre- and post-functional loading stability. Materials and methods: This study included 17 healthy patients with an age range of 24-61 years. Twenty-two DI were inserted into healed extraction sockets to replace missing tooth/ teeth in premolar and molar regions in upper and lower jaws. Implant stability was measured for each implant and was recorded as implant stability quotient (ISQ) immediately (ISQ0), and at 8 (ISQ8) and 12 (ISQ12) weeks postoperatively, as well as post-functional loading (ISQPFL). The pattern of implant stability changes throughout the study period and its correlation with the recipient jaw and the DI dimensions were evaluated. Results: There was a significant difference in ISQ values throughout the study. DI stability in the maxilla was significantly higher than that in mandible for the ISQ0, with no significant effect for the rest time points. The effect of implant diameter was significant with DI of 4.1mm diameter being more stable. While for the length, there was no significant difference regarding its effect on ISQ values through-out the study period. Conclusions: DI inserted in the maxilla demonstrated better primary stability with no effect of recipient jaw on secondary stability and after functional loading, also DI with wider diameter had better stability throughout the study whereas DI length showed no significant effect on stability
This article is an endeavour to highlight the relationship between social media and language evolution. It reviews the current theoretical efforts on communication and language change. The descriptive design, which is theoretically based on technological determision, is used. The assumption behind this review is that the social media plays a significant role in language evolution. Moreover, different platforms of social media are characterized by being the easiest and fastest means of communication. It concludes that the current theoretical efforts have paid much attention to the relationship between social media and language evolution. Such efforts have highlighted the fact that social media platforms are awash with a lot of acronyms, cybe
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show Moreلمعرفة مدى تأثير تمرينات مهارية وفق تقنية تركيز للتفكير الجاني على الدقة الحركة وتعلم هجمة الإيقاف بالغطس للطلاب في سلاح الشيش استخدمت الباحثتان المنهج التجريبي على عينة من طلاب المرحلة الثالثة بكلية التربية البدنية وعلوم الرياضة –جامعة ديالى والتي بلغت (30) طالباً موزعين على مجموعتين التجريبية والضابطة وبعد إكمال اجراءات البحث وتطبيق الاختبارات القبلية وتنفيذ التمرينات والاختبار البعدي ومعالجة الب
... Show MoreBackground: diabetic mellitus is one of the serious systemic diseases that may cause general systemic changes, which may be reflected in the oral cavity. The aims of this study were to assess the severity of dental caries, Mutans Streptococci and Lactobacilli in addition to flow rate and pH among uncontrolled and controlled diabetic groups in comparison with non-diabetic control group. Materials and Methods: Study groups consisted of 25 uncontrolled diabetic patients (HbA1c > 7), 25 controlled diabetic patients (HbA1c ? 7), in addition to 25 non-diabetic healthy looking individuals. Their age was (18-22) years from both genders. The diagnosis and recording of dental caries was according to severity of dental caries lesion through the applic
... Show MorePlanning of cities show great attention on streets planning as one of the most structural component foundations for cities, that providing many functional needs and connect parts of the city each other, and work as a commercial and services activities centers. Instead of this highly focused on distributing streets with different streets types such as economical and trading and housing streets. This concerned was only on the dimensions and scales of different types of vehicles and their movement. When scale and dimension and movement of mans were as a second priority in designing and planning streets. Which came's first for traditional streets. The research try to submit some designs guides for planners that contribute in re conce
... Show MoreFaujasite type NaY zeolite catalyst was prepared from locally available kaolin, then the prepared NaY zeolite have been modified by exchanging of sodium ion with ammonium to produce NH4Y zeolite. NH4Y zeolite was converted to HY zeolite by ion exchanging with oxalic acid. Zinc and nickel promoters have been added to the prepared HY zeolite catalyst, and the effect of these promoters on the catalytic activity of the prepared HY catalyst was studied in fluid catalytic cracking process using light gas oil as a feedstock. The experimental results show that the promoted catalyst gives higher gas oil conversion and gasoline yield than HY zeolite catalyst at the same reaction temperature and WHSV. It was also found that the promoted catalyst gi
... Show More
