Background: To assess the alveolar bone crest level (ABCL) by Cone Beam Computed To-mography (CBCT) and to investigate several variables as predictors for the height of the alveolar bone in adolescents. Materials and methods: Age, sex, and ethnic groups were rec-orded for each patient. CBCT images were used to obtain measurements of the interproximal alveolar bone level from the cementoenamel junction (CEJ) to the alveolar crest. The highest measurement in each sextant was recorded along with any presence of a vertical bone defect or calculus. Results: Total of 720 measurements were recorded for 120 subjects. No vertical bony defects or calculus were observed radiographically. Statistically significant (P< 0.05) differences were observed between ABCL measurements of males as compared to females, posterior teeth compared to anterior teeth and maxillary sextants in comparison to man-dibular ones. Additionally, value of ABCL significantly increased in relation to sex (r=0.309), maxillary posterior (r=0.509) and mandibular posterior sextants (r=0.506). Linear regression analysis indicated that the latter variables can predict the height of marginal bone, other independent variables were considered redundant. Conclusions: There was a low-profile of marginal bone loss among adolescents. Male sex, posterior teeth, and maxillary teeth have higher tendency for decreasing alveolar bone height.
Sadi formation is one of the main productive formations in some of Iraqi oil fields. This formation is characterized by its low permeability values leading to low production rates that could be obtained by the natural flow.
Thus, Sadi formation in Halfaya oil field has been selected to study the success of both of "Acid fracturing" and "Hydraulic fracturing" treatments to increase the production rate in this reservoir.
In acid fracturing, four different scenarios have been selected to verify the effect of the injected fluid acid type, concentration and their effect on the damage severity along the entire reservoir.
The reservoir damage severity has been taken as "Shallow–Medium– Sever
... Show MoreThe grammar structure transforms from its fundamental field to another field that takes new dimensions, and is used in another way in speech that differs from the first one, because the formula basis of the name(Faael) in speech is a (distorted characteristic), and the distorted characteristic indicates the stability and the necessity of the characterized. as this characteristic has changed from its use as a distorted characteristic which was established by the elders. to a use that differs from the first and cannot be overlooked to achieve a new purpose, to be used as plural
Abstract
In order to make an improvement associated with rotating biological contactor (RBC), a new design of biofilm reactor called as Rotating perforated disc biological contactor (RPBC) was developed in which the rotating discs are perforated. The transfer of oxygen from air to wastewater was investigated. Mass-transfer coefficient (KLa) in the liquid phase was determined by measuring the rate transfer of oxygen. A laboratory scale of (RPBC) consisted of a semicircular trough was used with a working capacity of 40 liters capacity of liquid. Synthetic wastewater was used as a liquid phase, while air was used as a gas phase.
The effects of m
... Show MoreThis research aims to develop transdermal patches of Ondansetron hydrochloride (OSH) with different types of polymers, ethyl cellulose and, polyvinyl pyrrolidone k30 in a ratio (3:0.5,3:1,3:2,2:1,1:1) with propylene glycol 20%w/w as a plasticizer. Prepared transdermal patches were evaluated for physical properties. The compatibility between the drug and excipients was studied by Differential scanning calorimetry (DSC), where there is no interaction between the drug and polymers. From the statistical study, there is a statistical difference between all the prepared formulations p<0.05. In-vitro Release study of transdermal patches was performed by using a paddle over the disc. The release profile of OSH follow
... Show MoreAspergillus fumigatus considered to be the most important species to cause respiratory infection cases in both humans and animals especially in cats in the last decades. In this study, we focused on the isolation and identification of Aspergillus fumigates by collecting 40 samples in deferent veterinary clinics and stray cats in Baghdad city, during the period (October 2021 to January 2022), all samples were cultured on Sabouraud dextrose agar and malt extract agar. The isolates identified by the laboratory methods, it’s depend on macroscopic and microscopic appearance. The results showed that (40) swaps taken from the pharynx of infected cats, included: Aspergillus fumigatus 16 (40%), Aspergillus spp. 7 (17.5%), Aspergillus niger
... Show MoreAbstract Infinitives and gerunds are non-finite verb forms which cannot be indicated by tense, number, or person. The construction of non-finite verbs is intricate because of their nature of meanings, forms, and functions. The major problem is that both infinitival and gerundial complements have identical functions and occupy identical positions in the sentences. Thus, there is a confusion in using an infinitival and gerundial forms after aspectual verbs. The selection of either one of these two forms as complements is controlled syntactically or semantically. Moreover, both forms can be used usually with similar predicate but with neat difference in meaning. In addition, there are problems with controlling the use of aspect, since aspectua
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More