Background: To assess the alveolar bone crest level (ABCL) by Cone Beam Computed To-mography (CBCT) and to investigate several variables as predictors for the height of the alveolar bone in adolescents. Materials and methods: Age, sex, and ethnic groups were rec-orded for each patient. CBCT images were used to obtain measurements of the interproximal alveolar bone level from the cementoenamel junction (CEJ) to the alveolar crest. The highest measurement in each sextant was recorded along with any presence of a vertical bone defect or calculus. Results: Total of 720 measurements were recorded for 120 subjects. No vertical bony defects or calculus were observed radiographically. Statistically significant (P< 0.05) differences were observed between ABCL measurements of males as compared to females, posterior teeth compared to anterior teeth and maxillary sextants in comparison to man-dibular ones. Additionally, value of ABCL significantly increased in relation to sex (r=0.309), maxillary posterior (r=0.509) and mandibular posterior sextants (r=0.506). Linear regression analysis indicated that the latter variables can predict the height of marginal bone, other independent variables were considered redundant. Conclusions: There was a low-profile of marginal bone loss among adolescents. Male sex, posterior teeth, and maxillary teeth have higher tendency for decreasing alveolar bone height.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
This research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.
It is axiomatic that languages mirror the world view of their users. Manipulating honorific forms among people inevitably reflects this truth . Honorifics are conventionalized forms or expressions manifested in all the world's languages and are used to express the social status of the participants in the verbal interaction and to convey indications like politeness and respect . English is no exception. However the question is what exactly creates these forms and their meanings. Although honorifics have been extensively researched from a grammatical and semantic angle , yet they haven’t received that significant attention i
... Show MoreIn this research, we highlight the most important research related to the mixed ligand complexes of the drug trimethoprim (TMP), and for the past 7 years where this drug has been used as a chelating ligand and gives stability to the complexes with ions of metal elements where these complexes, prepared and diagnosed, and for some research the bacterial activity was studied against different types of bacteria.
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreDrilling well design optimization reduces total Authorization for Expenditures (AFE) by decreasing well constructing time and expense. Well design is not a constant pattern during the life cycle of the field. It should be optimized by continuous improvements for all aspects of redesigning the well depending on the actual field conditions and problems. The core objective of this study is to deliver a general review of the well design optimization processes and the available studies and applications to employ the well design optimization to solve problems encountered with well design so that cost effectiveness and perfect drilling well performance are achievable. Well design optimization processes include unconventional design(slimhole) co
... Show MoreThis study sought to determine malformation caused by Ochratoxin-A (OTA) on mouse embryos. Twenty adult female white Swiss mice (mus msculus) were divided into four groups, with five females per group, and with one male placed with two females in a cage. Avaginal plug was observed in the early morning and the day of mating was considered as day of pregnancy followed by the first day of pregnancy. Three sub lethal concentrations of OTA were applied to the respective groups (other than the control), 1mg/kg, 2mg/kg and 4mg/kg. The animals were given 0.1 ml per 10 gm body weight per concentration of OTA once a day during days 7-14 of pregnancy. The control group animals were given distilled water. The pregnant mice were dissected, and the embry
... Show MoreIn this paper a nonlinear adaptive control method is presented for a pH process, which is difficult to control due to the nonlinear and uncertainties. A theoretical and experimental investigation was conducted of the dynamic behavior of neutralization process in a continuous stirred tank reactor (CSTR). The process control was implemented using different control strategies, velocity form of PI control and nonlinear adaptive control. Through simulation studies it has been shown that the estimated parameters are in good agreement with the actual values and that the proposed adaptive controller has excellent tracking and regulation performance.
The aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra without identity can be embedded into fuzzy normed algebra with identity and is an ideal in is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.
A simulation study of using 2D tomography to reconstruction a 3D object is presented. The 2D Radon transform is used to create a 2D projection for each slice of the 3D object at different heights. The 2D back-projection and the Fourier slice theorem methods are used to reconstruction each 2D projection slice of the 3D object. The results showed the ability of the Fourier slice theorem method to reconstruct the general shape of the body with its internal structure, unlike the 2D Radon method, which was able to reconstruct the general shape of the body only because of the blurring artefact, Beside that the Fourier slice theorem could not remove all blurring artefact, therefore, this research, suggested the threshold technique to eliminate the
... Show More